Explore >> Select a destination


You are here

cronokirby.com
| | martinralbrecht.wordpress.com
3.8 parsecs away

Travel
| | Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications....
| | neilmadden.blog
2.6 parsecs away

Travel
| | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it...
| | blog.cryptographyengineering.com
2.9 parsecs away

Travel
| | A few weeks ago I ran into a conversation on Twitter about the weaknesses of applied cryptography textbooks, and how they tend to spend way too much time lecturing people about Feistel networks and the boring details of AES. Some of the folks in this conversation suggested that instead of these things, we should be...
| | inquiryintoinquiry.com
33.0 parsecs away

Travel
| Re: R.J. Lipton and K.W. Regan ? Proving Cook's Theorem Synchronicity Rules? I just started reworking an old exposition of mine on Cook's Theorem, where I borrowed the Parity Function example from Wilf (1986), Algorithms and Complexity, and translated it into the cactus graph syntax for propositional calculus I developed as an extension of Peirce's...