You are here |
blog.cryptographyengineering.com | ||
| | | |
blog.trailofbits.com
|
|
| | | | ||
| | | |
windowsontheory.org
|
|
| | | | (Also available as a pdf file. Apologies for the many footnotes, feel free to skip them.) Computational problems come in all different types and from all kinds of applications, arising from engineering as well the mathematical, natural, and social sciences, and involving abstractions such as graphs, strings, numbers, and more. The universe of potential algorithms... | |
| | | |
keymaterial.net
|
|
| | | | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key... | |
| | | |
77wolfhowls.wordpress.com
|
|
| | Metal Detectors In Movie Theaters. |