- Introducing CFSSL - CloudFlare's PKI toolkit by Nick Sullivan
- Github Repo
- certmgr
- Equations For Modular Curves by Steven D. Galbraith
- ellipticnews
- Mathematics of Isogeny Based Cryptography
- Fast Algorithms for Towers of Finite Fields and Isogenies
- High-Speed Cryptography and Cryptanalysis
- Guide to Elliptic Curve Cryptography
- An Introduction to Mathematical Cryptography
- The Arithmetic of Elliptic Curves
- Elliptic Curves: Number Theory and Cryptography
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Algorithmic Cryptanalysis
- Mathematics of Public Key Cryptography
- Go memory management by Povilas
- Go: Memory Management and Allocation by Vincent Blanchon
- Building a better Go linker
- Visualizing Garbage Collection Algorithms
- Go GC: Solving the Latency Problem by Rick Hudson
- Implementing memory management with Golang’s garbage collector
- On-the-Fly Garbage Collection: An Exercise in Cooperation by Dijkstra, Lamport , Martin, Scholten, and Steffens
- Getting to Go: The Journey of Go's Garbage Collector by Rick Hudson
- Garbage Collection In Go : Part I - Semantics
- RICH: Automatically Protecting Against Integer-Based Vulnerabilities by David Brumley, Tzi-cker Chiueh, Robert Johnson
- Golang's GC
- A micro-manual for lisp - not the whole truth by John McCarthy
- Principles for technology-assisted contact-tracing by Daniel Kahn Gillmor
- Data Rights for Exposure Notification
- Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic
- Covid-19: The tough questions on a digital contact-tracing app
- Privacy-Preserving Contact Tracing by Apple and Google
- The Transport Layer Security v 1.3
- Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- Transport Layer Security (TLS) Cached Information Extension
- Measuring TLS key exchange with post-quantum KEM
- Post-quantum TLS without handshake signatures
- kemtls-experiment
- dilithium
- kyber
- MariaLab org and also
- ipvtechresearch
- Technology facilitating domestic violence. How is that possible?
- Threat Lab: Year in Review 2019
- Queer privacy
- Stalkerware-indicators
- How security researchers are working to expose stalkerware on your phone
- Feminism and protocols
- Taller de comunicación mujer
- Navegando libres por la red
- Vita-activa
- Acoso Online
- Dominemos la tecnología
- Safer nudes
- Alerta Machitrol
- ConsenfulTech
- Diagnóstico Violencia de género Ecuador
- Security and Privacy Experiences and Practices of Survivors of Intimate Partner Abuse
- Safe at Home: Towards a Feminist Critique of Cybersecurity
- Privacy threats in intimate relationships
- Tutorial: Quantum Programming
- An Introduction to Quantum Computing for Non-Physicists
- Programming Quantum Computers Tutorial
- Architectural Principles for a Quantum Internet
- Random Oracles are Practical: A Paradigm for Designing Efficient Protocols by Mihir Bellare and Phillip Rogaway
- The random oracle model: a twenty-year retrospective by Neal Koblitz and Alfred J. Menezes
- The Random Oracle Hypothesis is False by Richard Chang, Benny Chor, Oded Goldreich, Juris Hartmanis, Johan Hastad, Desh Ranjan and Panka J Rohatgi
- Systems of logic based on ordinals by Turing
- A proof of freedom from contradiction by Church
- Logic and Computation Intertwined by Prabhakar Ragde
- Random Oracles in a Quantum World by Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner and Mark Zhandry
- Universally Composable Security: A New Paradigm for Cryptographic Protocols by Ran Canetti
- Turing Oracle Machines, Online Computing, and Three Displacements in Computability Theory by Robert I. Soare
- Private Message Franking with After Opening Privacy by Iraklis Leontiadis and Serge Vaudenay
- Message Franking via Committing Authenticated Encryption by Paul Grubbs, Jiahui Lu, and Thomas Ristenpart
- Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption by Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, and Thomas Ristenpart