You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<ahref="https://www.reddit.com/r/crypto/" target="_blank">[Reddit] r/crypto</a> Reddit main sub for cryptography. You can ask questions, find recent plublished paper and chat with the community.
35
35
</p>
36
36
</li>
37
-
37
+
<li>
38
+
<p>
39
+
<ahref="https://www.reddit.com/r/QuantumComputing/" target="_blank">[Reddit] r/QuantumComputing</a> Of course Reddit have its community for QC. Here you can find a lot of interesting ressources, ask questions and chat.
40
+
</p>
41
+
</li>
38
42
<li>
39
43
<p>
40
44
<ahref="https://discord.com/invite/h9E7cna5pV" target="_blank">[Discord] Cryptohack</a> A wonderful community of cryptographers, you can ask for help, follow the news, share memes and a lot more!
<ahref="https://www.reddit.com/r/QuantumComputing/" target="_blank">r/QuantumComputing</a> Of course Reddit have its community for QC. Here you can find a lot of interesting ressources, ask questions and chat.
is an open-source consensual digital forensic analysis and incident response solution. The project consists of an open-source tool suite that provides a comprehensive mobile device forensics and network traffic analysis platform targeting mobile devices, both for Android and iOS.
96
-
You have two main tools: PiRogue, a RaspberryPI analyzing network traffic in real time and Colander, an incident response and knowledge management platform.
This amazing Czech laboratory publishes various of content such as dataset, tools, white papers all around the theme of detecting malicious connexion in a network.
96
+
Their website is very wide and you have plenty of things to discover.
is a framework for building tiny and fast binaries for cross-platform desktop application. Developers can integrate any front-end framework that compiles to HTML, JS and CSS for building their user interface. The backend of the application is a rust-sourced binary with an API that the front-end can interact with.
165
-
Tauri is an alternative to Electron and have the benefit to not be based on Chromium.
A promising high-level, massively parallel programming language. Bend have the particularity to parallelize automatically every single mathematical operation allowing you to exploit 100% of your GPU without having to handle thread creation, locks, mutexes, or atomics.
176
-
Bend is cross-platform, available on WSL2 and can support 10000 concurrent thread. Only Nvidia's GPU are supported for the moment.
is an open-access web book dedicated to the art and science of computing by Sergey Slotin. Its intended audience is everyone from performance engineers and practical algorithm researchers to undergraduate computer science students.
Created by Daniel Lemire, SimdJson is tool parsing gigabytes of JSON per second. Used by Facebook/Meta Velox, the Node.js runtime and dozen of other real world usage, this tool is certainly one of the fastet in the world for json parsing.
A promising high-level, massively parallel programming language. Bend have the particularity to parallelize automatically every single mathematical operation allowing you to exploit 100% of your GPU without having to handle thread creation, locks, mutexes, or atomics.
163
+
Bend is cross-platform, available on WSL2 and can support 10000 concurrent thread. Only Nvidia's GPU are supported for the moment.
is an open-access web book dedicated to the art and science of computing by Sergey Slotin. Its intended audience is everyone from performance engineers and practical algorithm researchers to undergraduate computer science students.
Created by Daniel Lemire, SimdJson is tool parsing gigabytes of JSON per second. Used by Facebook/Meta Velox, the Node.js runtime and dozen of other real world usage, this tool is certainly one of the fastet in the world for json parsing.
around deep techs and, in particular, quantum technologies. He brings them a 360° understanding of
95
103
scientific,
96
104
technology, marketing as well as ecosystems development.<br/>
97
-
Author: Olivier Ezratty - 2024.
105
+
<strong>Author: Olivier Ezratty</strong>
106
+
</p>
107
+
</li>
108
+
</ul>
109
+
110
+
<ul>
111
+
<lidata-tags="all cyber">
112
+
<p>
113
+
<ahref="https://pmc.ncbi.nlm.nih.gov/articles/PMC9601406/pdf/entropy-24-01503.pdf" target="_blank">Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification</a><br/>
114
+
This paper present several methods of entropy calculation in order to detect if the file has been encrypted or not. It is a very precious work for malware detection which is a very sensitive field. <br/>
115
+
<strong>Authors : Simon R. Davies - Richard Macfarlane - William J. Buchanan - 2022</strong>
116
+
</p>
117
+
</li>
118
+
<lidata-tags="all cyber">
119
+
<p>
120
+
<ahref="https://scispace.com/pdf/an-advanced-quantum-entropy-based-ransomware-detection-7frizpwm4qb4.pdf" target="_blank">An Advanced Quantum-Entropy Based Ransomware Detection Mechanism</a>
121
+
Another paper about malware detection but this time with a new method based on quantum entropy. It proposed a new algorithm called QEDD.
122
+
<strong>Eric Mazunin - Ronald Bishop - Elizabeth Carter - Lawrence Knight - 2024</strong>
<ahref="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf" target="_blank">Announcing the ADVANCED ENCRYPTION STANDARD (AES)</a>
124
-
FIPS approved standard for the The Advanced Encryption Standard (AES) cryptographic algorithm
149
+
FIPS approved standard for the The Advanced Encryption Standard (AES) cryptographic algorithm.
150
+
</p>
151
+
</li>
152
+
<lidata-tags="all nist">
153
+
<p>
154
+
<ahref="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards" target="_blank">NIST Releases First 3 Finalized Post-Quantum Encryption Standards</a>
155
+
This page leads to the first three pulication of the NIST for Post-Quantum encryption standards. You can read about Module-Lattice-Based Digital Signature Standard, Key encapsulation and stateless hash-based DSA.
0 commit comments