Welcome to Asecuritysite.com
  • Home
  • Index
  • Cipher
  • Blogs
  • IP
  • IDS
  • Magic
  • Net
  • Cisco
  • Cyber
  • Test
  • Fun
  • Subj
  • About

Blogs (Medium.com version of Blog posts)

Pigpen[Blogs Home][Home]

These are some of Bill's blog posts (2,757 articles). Versions: [Link to Medium.com] [Local version (not paywalled)][Graphics].

  • AES GCM SIV A Better Version of AES GCM . [Here]. Date published: 21 August 2025.
  • Authenticated Encryption With Additional Data AEAD Meet AES GCM ChaCha20 Poly1305 AES CCM . [Here]. Date published: 20 August 2025.
  • How Much Does It Cost To Keep A Secret . [Here]. Date published: 17 August 2025.
  • Quantum Robust Firewalls Meet The Cipher Translation Proxy. [Here]. Date published: 16 August 2025.
  • Catch 22 Scanning for Compromised Public Keys. [Here]. Date published: 15 August 2025.
  • MiMC Feistel two branch Feistel network over F p. [Here]. Date published: 12 August 2025.
  • GitHub Moves On. [Here]. Date published: 12 August 2025.
  • The MiMC 7 Hash. [Here]. Date published: 10 August 2025.
  • Solving Sudoko Without Revealing Your Answer. [Here]. Date published: 10 August 2025.
  • The Wonder of Hash SHA 256 Pedersen and Poseidon. [Here]. Date published: 9 August 2025.
  • The Pedersen Hash. [Here]. Date published: 8 August 2025.
  • Nothing up your Sleeve Safe Curves. [Here]. Date published: 7 August 2025.
  • Groups Subgroups and Orders Of An Elliptic Curve. [Here]. Date published: 7 August 2025.
  • The First Rule of Cryptography You Don t Talk About Zero Or The Identity Element. [Here]. Date published: 6 August 2025.
  • Baby Jubjub and Zero Knowledge Proofs. [Here]. Date published: 6 August 2025.
  • The Method That Was Going To Be Cracked But It Just Didn t Happen Koblitz and Miller. [Here]. Date published: 5 August 2025.
  • VeraCrypt And Memories of Classic Ciphers Twofish Serpent and Camellia . [Here]. Date published: 3 August 2025.
  • EUF CMA and SUF CMA Which Gives Stronger Security for Signatures . [Here]. Date published: 3 August 2025.
  • Asking Satoshi Why RIPEMD160 and SHA 256 and Why RIPEMD160 . [Here]. Date published: 3 August 2025.
  • The Post Quantum Migration of Blockchain. [Here]. Date published: 2 August 2025.
  • What Is Taproot in Bitcoin . [Here]. Date published: 31 July 2025.
  • Claus Peter Schnorr RIP. [Here]. Date published: 31 July 2025.
  • NFTs for a Future World. [Here]. Date published: 30 July 2025.
  • If A Bitcoin Key Starts With 6P What Type of Key Is It . [Here]. Date published: 30 July 2025.
  • Happy Birthday to Ethereum . [Here]. Date published: 30 July 2025.
  • Witness based Encryption Using an NP Problem To Encrypt a Message. [Here]. Date published: 29 July 2025.
  • We Need To Stop Using Private Keys and Move To Storing Seed Values. [Here]. Date published: 29 July 2025.
  • So What s In a Bitcoin Wallet . [Here]. Date published: 29 July 2025.
  • Converting A Private Key Into a Public Address on Ethereum. [Here]. Date published: 28 July 2025.
  • Linking The Distributed Web With The Centralised Web The Web Returns To Its Roots. [Here]. Date published: 27 July 2025.
  • In the EU Less Than Five Years To Migrate to PQC for High Risk Areas. [Here]. Date published: 26 July 2025.
  • With Oil and Vinegar Have Some MAYO. [Here]. Date published: 25 July 2025.
  • The PQC Lord of the Rings . [Here]. Date published: 25 July 2025.
  • Getting CROSS PQC Signature Performance in 2025. [Here]. Date published: 23 July 2025.
  • PQC Signatures And What s Next . [Here]. Date published: 21 July 2025.
  • To Statefully Hash or Not Statefully Hash That is the Post Quantum Question. [Here]. Date published: 20 July 2025.
  • ML KEM is not Diffie Hellman Key Exchange A Step by Step Guide to ML KEM. [Here]. Date published: 19 July 2025.
  • Why Not Pick McEliece for PQC Encryption . [Here]. Date published: 18 July 2025.
  • Post Quantum Signatures with the Wolf. [Here]. Date published: 18 July 2025.
  • RSA Key Analysis with wolfSSL. [Here]. Date published: 16 July 2025.
  • Magic Number of 30 the DER Format Reveals Our Crypto Magic. [Here]. Date published: 15 July 2025.
  • One of the Greatest Computer Science Conferences Ever Crypto 85. [Here]. Date published: 14 July 2025.
  • Email is Silly Owning Your Own Email Address. [Here]. Date published: 12 July 2025.
  • ECIES Elliptic Curves and Symmetric Key with wolfCrypt. [Here]. Date published: 12 July 2025.
  • At the current time massively secure for secp256k1 and above . [Here]. Date published: 12 July 2025.
  • Cloudflare The Great AI Bot Defender. [Here]. Date published: 10 July 2025.
  • The Greatest Cryptographic Invention . [Here]. Date published: 9 July 2025.
  • Proof of Solvency. [Here]. Date published: 6 July 2025.
  • The Farce of the Patent System . [Here]. Date published: 5 July 2025.
  • Trust4Futures Going Deep in Technology EU Skills Development and Addressing The Gender Gap. [Here]. Date published: 4 July 2025.
  • Prio3 Private Robust and Scalable Computation of Aggregate Statistics and SNIPs. [Here]. Date published: 2 July 2025.
  • The Gov Uk App Is Not A Digital Wallet and Is Just a Bunch of Web Pages . [Here]. Date published: 1 July 2025.
  • X Wing PQC Key Encapsulation But Better. [Here]. Date published: 30 June 2025.
  • Burn Mint. [Here]. Date published: 30 June 2025.
  • From On Chain to Off Chain State Channels and Roll ups. [Here]. Date published: 29 June 2025.
  • DAEAD Deterministic Authenticated Encryption with Associated Data. [Here]. Date published: 29 June 2025.
  • The Beauty of Public Key Encryption with Key Encapsulation HPKE. [Here]. Date published: 28 June 2025.
  • If Carlsberg Did Conferences Towards Deep Tech in Digital Trust. [Here]. Date published: 28 June 2025.
  • Hybrid Encryption ECIES. [Here]. Date published: 28 June 2025.
  • JSON and Encryption Keys A Marriage Made In Heaven. [Here]. Date published: 27 June 2025.
  • Shafrira Shafi And The Nobel Prize of Computer Science. [Here]. Date published: 26 June 2025.
  • Google Goes For Post Quantum Signatures. [Here]. Date published: 23 June 2025.
  • Help with AWS ML DSA. [Here]. Date published: 22 June 2025.
  • Using ML DSA in AWS. [Here]. Date published: 21 June 2025.
  • In a World of GenAI File Formats Are So 20th Century . [Here]. Date published: 19 June 2025.
  • A New Dawn in Cybersecurity Welcome to the Quantum robust Cloud. [Here]. Date published: 19 June 2025.
  • Builder of the Foundations of Cybersecurity Ralph C Merkle. [Here]. Date published: 18 June 2025.
  • Frosty Key Shares. [Here]. Date published: 14 June 2025.
  • The Future of Payments To CBDC or Not to CBDC That is the question. [Here]. Date published: 12 June 2025.
  • Identity Shouldn t Be Forced. [Here]. Date published: 8 June 2025.
  • Identity in the Hands of the Citizen. [Here]. Date published: 7 June 2025.
  • Did You Know I Invented The Hyper visor and Hallucinations in Student Courseworks. [Here]. Date published: 7 June 2025.
  • Will The Singularity Ever Happen . [Here]. Date published: 1 June 2025.
  • Deterministic and Non deterministic Key Exchange. [Here]. Date published: 1 June 2025.
  • AEGIS or AES . [Here]. Date published: 1 June 2025.
  • SipHash and WASM. [Here]. Date published: 31 May 2025.
  • Salt and WASM. [Here]. Date published: 31 May 2025.
  • Digital Forensics and Fraud Analysis Just Got Easier. [Here]. Date published: 30 May 2025.
  • BBS The Short And Anonymised Group Signature using WASM. [Here]. Date published: 27 May 2025.
  • Accumulators With WASM Crypto Pairing in the Browser. [Here]. Date published: 27 May 2025.
  • Argon2 bcrypt scrypt or PBKDF2 . [Here]. Date published: 26 May 2025.
  • From JVM and Flash to WASM. [Here]. Date published: 25 May 2025.
  • Crypto In The Blood The Rabin Family. [Here]. Date published: 24 May 2025.
  • You don t get 256 bit RSA keys these days these are too small We start at 2 048 at least . [Here]. Date published: 23 May 2025.
  • Picking The Modulus For Homomorphic Encryption. [Here]. Date published: 23 May 2025.
  • Energy Footprint of PQC Key Generation. [Here]. Date published: 23 May 2025.
  • Privacy Aware Machine Learning Homomorphic Encryption and Federated Learning. [Here]. Date published: 16 May 2025.
  • WASM and Security. [Here]. Date published: 14 May 2025.
  • The World of Web 3 Is a Whole Lot Closer. [Here]. Date published: 14 May 2025.
  • WebAssembly Is Cool . [Here]. Date published: 13 May 2025.
  • The Wonderful FN DSA. [Here]. Date published: 11 May 2025.
  • Finally A New World of Digital Trust. [Here]. Date published: 6 May 2025.
  • Stable Diffusion v DALLE 3. [Here]. Date published: 5 May 2025.
  • Llama The AI At Everyone s Fingertip. [Here]. Date published: 4 May 2025.
  • Turing To A Copilot To Reduce Cognitive Loads. [Here]. Date published: 3 May 2025.
  • We Are Running On Legacy Systems . [Here]. Date published: 2 May 2025.
  • Andrew Chi Chih Yao. [Here]. Date published: 26 April 2025.
  • Order and Sub Groups Orders in ECC. [Here]. Date published: 25 April 2025.
  • The Mighty Base Point G in Elliptic Curve Cryptography And What s An Order . [Here]. Date published: 24 April 2025.
  • Creating Secure Covert Channels with LLMs over Public Channels. [Here]. Date published: 24 April 2025.
  • TSPs e ID e IDAS 2 and the UK Digital Wallet. [Here]. Date published: 19 April 2025.
  • Living With A Dictator Anamorphic Cryptography. [Here]. Date published: 19 April 2025.
  • Think of PQC As A Cyber World As Mostly Without Trapdoors. [Here]. Date published: 18 April 2025.
  • Benchmarking Digital Signatures Ed25519 EdDSA Wins for Signing RSA Wins for Verifying. [Here]. Date published: 15 April 2025.
  • Eccfrog512ck2 An Enhanced 512 bit Weierstrass Elliptic Curve. [Here]. Date published: 13 April 2025.
  • The Three Protocols That Could Bring Down The Internet And Life as We Know It DNS PKI and BGP. [Here]. Date published: 12 April 2025.
  • Recall Is Back The Dumbest AI That Will Track Everything You Do . [Here]. Date published: 12 April 2025.
  • After Nearly 50 Years RSA is Still in the News Femat s Attack on RSA. [Here]. Date published: 10 April 2025.
  • Bye bye Three way Handshake and Hello to 0 RTT. [Here]. Date published: 8 April 2025.
  • The Wonderful World of Dilithium aka ML DSA and The Fiat Shamir Method. [Here]. Date published: 5 April 2025.
  • You need to divide by 8 to get the bytes . [Here]. Date published: 3 April 2025.
  • No Excuses OpenSSL Enters the Quantum Age. [Here]. Date published: 3 April 2025.
  • Piger Fabrica Syndrome The End of Public Key Encryption . [Here]. Date published: 1 April 2025.
  • Xmas Coming Early OpenSSL Finally Enters a Quantum World. [Here]. Date published: 29 March 2025.
  • Cybersecurity Tightens with PCI DSS v4. [Here]. Date published: 29 March 2025.
  • Get Ready for FN DSA Slower Than Dilithium But Smaller Keys Ciphertext. [Here]. Date published: 28 March 2025.
  • Telecoms Goes Post Quantum With Attribute Based Encryption ABE . [Here]. Date published: 26 March 2025.
  • How Public Key Encryption PKE Differs From Key Encapsulation Methods KEMs . [Here]. Date published: 26 March 2025.
  • A Bluffer s Guide to FIPS. [Here]. Date published: 23 March 2025.
  • It s Your Cybersecurity Birthday . [Here]. Date published: 22 March 2025.
  • When the Cipher Equals The Message Message Concealing in RSA. [Here]. Date published: 21 March 2025.
  • Are There More Electrons in the Universe Than 512 bit Prime Numbers . [Here]. Date published: 21 March 2025.
  • Provable Secure Public Key Encryption with the Rabin Method. [Here]. Date published: 20 March 2025.
  • NCSC Guidelines on PQC. [Here]. Date published: 20 March 2025.
  • Cracking A Nearly One Way Function. [Here]. Date published: 20 March 2025.
  • HP Release a Quantum robust Printer. [Here]. Date published: 19 March 2025.
  • We As A Community Just Aren t Good At PKI. [Here]. Date published: 13 March 2025.
  • From Bits To Qubits And Butterflies Causing Hurricanes. [Here]. Date published: 13 March 2025.
  • HQC Provides A Key Vehicle For The Future of the Internet. [Here]. Date published: 11 March 2025.
  • Mobile Phone Networks RFID and TETRA The Weakest Links . [Here]. Date published: 9 March 2025.
  • When Students Fix Crypto Bugs You Have Great Students. [Here]. Date published: 2 March 2025.
  • Watch Out For TgToxic. [Here]. Date published: 1 March 2025.
  • Galaxy S25 Goes Quantum Robust. [Here]. Date published: 26 February 2025.
  • One of the Largest Hacks Ever But Will The Hackers Be Able To Launder The Gains . [Here]. Date published: 23 February 2025.
  • Apple Steps Back Their Security. [Here]. Date published: 22 February 2025.
  • The Proper Password Hasher and Memory Buster Argon2. [Here]. Date published: 18 February 2025.
  • CryptoRoll ups and Hash. [Here]. Date published: 15 February 2025.
  • The Rise of the Machine and Believe in Privacy. [Here]. Date published: 12 February 2025.
  • Being Proud and Questioning. [Here]. Date published: 12 February 2025.
  • Elliptic Curve Cryptography ECC Questions. [Here]. Date published: 9 February 2025.
  • Creating Your Own Symmetric Key Cipher in a Web Page. [Here]. Date published: 3 February 2025.
  • Random Values In the Browser. [Here]. Date published: 2 February 2025.
  • In Cybersecurity What is GREASE . [Here]. Date published: 30 January 2025.
  • Wrapping Encryption. [Here]. Date published: 27 January 2025.
  • When Random Is Not Quite Random Beating Ransomware. [Here]. Date published: 27 January 2025.
  • So What Does an RSA Signing Key Look Like . [Here]. Date published: 27 January 2025.
  • Diffie Hellman Key Exchange in a Quantum World. [Here]. Date published: 24 January 2025.
  • The Foundation of Cybersecurity D3FEND 1 0. [Here]. Date published: 20 January 2025.
  • PBKDF2 and Encrypting Data. [Here]. Date published: 17 January 2025.
  • Explaining RSA PKCS 1 5 RSA OAEP or RSA PSS. [Here]. Date published: 12 January 2025.
  • Promising Cryptography JavaScript Promises in Encryption. [Here]. Date published: 11 January 2025.
  • CTR Mode in AES. [Here]. Date published: 11 January 2025.
  • Finally Encryption By Default In Healthcare . [Here]. Date published: 9 January 2025.
  • Creating Ed25519 Signing Keys Random or from a Passphrase. [Here]. Date published: 5 January 2025.
  • Authenticated Encryption with Box and JavaScript. [Here]. Date published: 4 January 2025.
  • Happy 16th Birthday to Bitcoin. [Here]. Date published: 3 January 2025.
  • Boxing with JavaScript. [Here]. Date published: 3 January 2025.
  • Solving Delegation Within Trust Alice sells her House to Bob. [Here]. Date published: 2 January 2025.
  • Gotta Love and Hate JavaScript Proxy Re encryption. [Here]. Date published: 2 January 2025.
  • Proxy Re encryption PRE With Fragments. [Here]. Date published: 1 January 2025.
  • Proxy Re Encryption Passing a Secret Key With Rust. [Here]. Date published: 1 January 2025.
  • Malware Spear Phishing Detection Meet TLSH and ssdeep. [Here]. Date published: 1 January 2025.
  • The Mighty Argon2 The Cybersecurity Titan. [Here]. Date published: 31 December 2024.
  • Verifiable Delay Functions With Python for Modulo Square Roots. [Here]. Date published: 30 December 2024.
  • Goodbye to 2024 And Hello to 2025. [Here]. Date published: 30 December 2024.
  • Unclonable Private Keys with Quantum Methods One shot Signatures. [Here]. Date published: 29 December 2024.
  • The Splurge From Old Cryptography to Obfuscation VDFs and Enhanced EVM. [Here]. Date published: 29 December 2024.
  • Creating Randomization on Blockchains Verifiable Delay Functions. [Here]. Date published: 29 December 2024.
  • Big Changes Ahead for the Method that Secures The Internet. [Here]. Date published: 29 December 2024.
  • Privacy Aware String Matching Using the Goldwasser Micali Public Key Method an XOR Homomorphic . [Here]. Date published: 28 December 2024.
  • Processing Floating Point Values for Paillier Homomorphic Addition and RSA Homomorphic . [Here]. Date published: 27 December 2024.
  • RSA and Homomorphic Multiplication. [Here]. Date published: 26 December 2024.
  • ElGamal Encryption and Homomorphic Addition. [Here]. Date published: 26 December 2024.
  • Goldwasser Macali Probabilistic Encryption and XOR Homomorphic Encryption. [Here]. Date published: 24 December 2024.
  • ElGamal and Homomorphic Multiplication. [Here]. Date published: 24 December 2024.
  • Damgard Jurik Homomorphic Addition. [Here]. Date published: 24 December 2024.
  • Okamoto Uchiyama Public Key Encryption And Additive Homomorphic Encryption. [Here]. Date published: 23 December 2024.
  • David Naccache and Jacques Stern And The Uncracked Method With Homomorphic Addition. [Here]. Date published: 23 December 2024.
  • Making ElGamal Encryption Homomorphically Additive Meet Exponential ElGamal. [Here]. Date published: 22 December 2024.
  • Making ElGamal Additively Homomorphic with Elliptic Curves. [Here]. Date published: 22 December 2024.
  • Benaloh Public Key Encryption. [Here]. Date published: 22 December 2024.
  • The Builder of Lattices. [Here]. Date published: 21 December 2024.
  • The Builder of Hashing Methods and much more . [Here]. Date published: 21 December 2024.
  • Partial Homomorphic Encryption PHE . [Here]. Date published: 21 December 2024.
  • PQC and Symmetric Key in Perfect Harmony. [Here]. Date published: 19 December 2024.
  • Shock News SHA 256 ECDSA and RSA Not Approved in Australia By 2030. [Here]. Date published: 16 December 2024.
  • Hybrid Encryption with RSA and AES. [Here]. Date published: 16 December 2024.
  • Should You Go Hybrid With Key Exchanges . [Here]. Date published: 15 December 2024.
  • Get Ready for NTT. [Here]. Date published: 15 December 2024.
  • Does Willow Cause a Major Risk to Public Key Methods . [Here]. Date published: 14 December 2024.
  • The True Dawn of ZKP and Secure MPC Privacy and The Digital Pound. [Here]. Date published: 12 December 2024.
  • So What Is a Non interactive Zero Knowledge Proof . [Here]. Date published: 8 December 2024.
  • Converting Zero Knowledge Proofs to Digital Signatures. [Here]. Date published: 8 December 2024.
  • Salt Typhoon. [Here]. Date published: 7 December 2024.
  • Kyber Is Great But We Need an Alternative NIST Should Announce Soon. [Here]. Date published: 7 December 2024.
  • Making Commitments. [Here]. Date published: 1 December 2024.
  • Lattice Encryption Has A Similar Approach to ElGamal Encryption. [Here]. Date published: 1 December 2024.
  • Faster Than Dilithium And Much Smaller Keys Meet FAEST. [Here]. Date published: 30 November 2024.
  • Chrome For Sale . [Here]. Date published: 25 November 2024.
  • A Great Researcher and Teacher Alfred Menezes. [Here]. Date published: 23 November 2024.
  • Speeding Up Fully Homomorphic Encryption. [Here]. Date published: 20 November 2024.
  • Mixing Oil and Vinegar Works in a Post Quantum World. [Here]. Date published: 20 November 2024.
  • Hidding Attributes in ABE DIPPE Decentralized Inner Product Predicate Encryption . [Here]. Date published: 18 November 2024.
  • MAABE Multi Authority Attribute Based Encryption scheme. [Here]. Date published: 17 November 2024.
  • FAME and Enhanced Attributed Based Security. [Here]. Date published: 17 November 2024.
  • Towards Zero Trust and Attribute Based Encryption. [Here]. Date published: 16 November 2024.
  • High Performance Computing and Crypto Cracking. [Here]. Date published: 15 November 2024.
  • Creating Collisions and ChatGPT. [Here]. Date published: 15 November 2024.
  • Schneier s Law and Creating a Random Elliptic Curve. [Here]. Date published: 10 November 2024.
  • Most Things In Cybersecurity Aren t Perfect and Just Hard Problems Cracking Low Order Elliptic . [Here]. Date published: 10 November 2024.
  • The Mighty CRC. [Here]. Date published: 7 November 2024.
  • Post Quantum Signatures in a Browser with JavaScript. [Here]. Date published: 6 November 2024.
  • Post Quantum Cryptography in a Browser. [Here]. Date published: 4 November 2024.
  • No Room for Haraka Hashing in FIPS 205. [Here]. Date published: 3 November 2024.
  • Microsoft s Silly Root Certificates. [Here]. Date published: 3 November 2024.
  • First You Have PowerShell and Then It s Gone. [Here]. Date published: 3 November 2024.
  • A Long Goodbye to RSA and ECDSA and Quick Hello to SLH DSA. [Here]. Date published: 3 November 2024.
  • Pretend AI aka Microsoft Recall. [Here]. Date published: 2 November 2024.
  • Breaking XCB Mode For AES 128 Symmetric Key Encryption. [Here]. Date published: 1 November 2024.
  • HAWK Is The Last Lattice Method Standing for Additional PQC Signatures. [Here]. Date published: 30 October 2024.
  • To PreHash or Not To PreHash That is the Question. [Here]. Date published: 29 October 2024.
  • The Rise of the Woke Bots Or Rewriting History AI Reflects Us . [Here]. Date published: 28 October 2024.
  • Get Used to Three Boring Acronyms ML KEM ML DSA and SLH DSA. [Here]. Date published: 28 October 2024.
  • So What Is A PreHash And What Has it to do With Post Quantum Signatures . [Here]. Date published: 27 October 2024.
  • ParallelHash. [Here]. Date published: 26 October 2024.
  • Haraka 2 with Bouncy Castle The Short Input Hash Reduced Energy and Fit For a Post Quantum Age. [Here]. Date published: 26 October 2024.
  • From NET 1 0 to NET 9 0. [Here]. Date published: 26 October 2024.
  • TupleHash. [Here]. Date published: 24 October 2024.
  • Round 2 PQC Additional Signatures Multivariate and MPC in the Head To The Fore. [Here]. Date published: 24 October 2024.
  • FortiJump A Major Zero Day Vulnerability. [Here]. Date published: 24 October 2024.
  • Our Current Hardware Architectures Are Often Not Fit For a World of ML and Homomorphic Encryption. [Here]. Date published: 23 October 2024.
  • NIST Looks To The Future of Cryptography SHA 1 3DES and SHA 224 on Naughty Step. [Here]. Date published: 23 October 2024.
  • Machine Learning with Homomorphic Encryption and SVM. [Here]. Date published: 22 October 2024.
  • The Wonderful World of Proxies. [Here]. Date published: 21 October 2024.
  • The Largest Prime Number Ever Found and the 52nd Mersenne Prime . [Here]. Date published: 21 October 2024.
  • Goodbye Google and is the Microsoft and OpenAI Partnership Fraying . [Here]. Date published: 19 October 2024.
  • DES and 3DES. [Here]. Date published: 19 October 2024.
  • After 48 Years It s A Long Goodbye to the Diffie Hellman Method. [Here]. Date published: 16 October 2024.
  • ML KEM Shows The Future of the Security of the Internet. [Here]. Date published: 15 October 2024.
  • A Long Goodbye to RSA ECDSA and EdDSA and Big Hello to ML DSA. [Here]. Date published: 15 October 2024.
  • The Safe Bet for PQC Signatures SPHINCS . [Here]. Date published: 13 October 2024.
  • Military Grade Cryptography Cracked No . [Here]. Date published: 12 October 2024.
  • Towards The Future of the Trust Privacy and Security Kurt Rohloff and Yuriy Polyakov. [Here]. Date published: 11 October 2024.
  • WAFs Show That End to End TLS Encryption Tunnels Can Be Broken Into Two Tunnels. [Here]. Date published: 6 October 2024.
  • Software Cybersecurity Risks on Embedded Devices IoT. [Here]. Date published: 6 October 2024.
  • Hardware Security By Design. [Here]. Date published: 6 October 2024.
  • The Real Satoshi . [Here]. Date published: 5 October 2024.
  • It s a Perfect 10 . [Here]. Date published: 5 October 2024.
  • Fortuna. [Here]. Date published: 5 October 2024.
  • Humans v AI in Cybersecurity. [Here]. Date published: 29 September 2024.
  • JavaScript Is A Trademark . [Here]. Date published: 28 September 2024.
  • Salt Is Good in Cybersecurity But Pepper Is Even Better. [Here]. Date published: 24 September 2024.
  • eIDAS2 and AdES Will Change Our Digital World And Break Down The Barriers of the Past. [Here]. Date published: 22 September 2024.
  • Logically The Same But Different Canonical XML and Exclusive XML Canonicalization. [Here]. Date published: 22 September 2024.
  • Little Endians and Big Endians Intel v IBM and IP v The Rest. [Here]. Date published: 22 September 2024.
  • The MITRE EMD3D Model Hardware Threats. [Here]. Date published: 20 September 2024.
  • Homomorphic Encryption for Gray Codes. [Here]. Date published: 18 September 2024.
  • More Maths Please. [Here]. Date published: 14 September 2024.
  • Proving Alice is Alice With A Pseudo Random Function PRF . [Here]. Date published: 12 September 2024.
  • Finally A Security Framework for Devices EMB3D. [Here]. Date published: 11 September 2024.
  • Attribute Certificates. [Here]. Date published: 9 September 2024.
  • A True Random Number Generator Jitter Fluctions. [Here]. Date published: 9 September 2024.
  • The Brainpool Curves. [Here]. Date published: 8 September 2024.
  • The Wonderful Ring Learning With Errors RLWE and Homomorphic Encryption. [Here]. Date published: 7 September 2024.
  • Squeezing Bits Meet MD Sponge and HAIFA. [Here]. Date published: 4 September 2024.
  • EUCLEAK and Side Channels. [Here]. Date published: 4 September 2024.
  • My Top 5 Programming Languages. [Here]. Date published: 1 September 2024.
  • Teaching Theory and Practice in Cryptography The Wonderful Jupyter Notebooks. [Here]. Date published: 31 August 2024.
  • Rockets Electric Cars and When Open Source Goes For Profit. [Here]. Date published: 31 August 2024.
  • What Does a Secret Key Look Like in Homomorphic Encryption . [Here]. Date published: 27 August 2024.
  • Authenticated Key Exchange with MQV. [Here]. Date published: 27 August 2024.
  • Avoiding 0 0 0 0 0 In Your Firewall When Using A WAF. [Here]. Date published: 26 August 2024.
  • ARADI and LLAMA for Memory Encryption. [Here]. Date published: 26 August 2024.
  • Homomorphic Processing of sin x x. [Here]. Date published: 25 August 2024.
  • Solving Quadratic Equations With Homomorphic Encryption. [Here]. Date published: 24 August 2024.
  • The End of Role based Security and the Rise of Attribute based Security. [Here]. Date published: 23 August 2024.
  • Squeezing Data Miyaguchi Preneel One Way Compression. [Here]. Date published: 23 August 2024.
  • Snake Oil Sales and Boiling The Ocean. [Here]. Date published: 23 August 2024.
  • Ron Was Wrong Whit Was Right. [Here]. Date published: 23 August 2024.
  • Pafnuty Lvovich Chebyshev and Approximation in a World of Homomorphic Encryption. [Here]. Date published: 22 August 2024.
  • Maths Magic and Big Floating Point Values. [Here]. Date published: 22 August 2024.
  • Goodbye x64 and Hello to ARM and Windows for Virtualisation. [Here]. Date published: 22 August 2024.
  • Migrating To A Post Quantum World of Trust and Security. [Here]. Date published: 20 August 2024.
  • As GitHub Glitches Are We Too Dependent on Microsoft . [Here]. Date published: 15 August 2024.
  • Resilience Privacy and Security Homomorphic Encryption with Shamir Shares. [Here]. Date published: 14 August 2024.
  • Bit level Homomorphic Computations FHEW. [Here]. Date published: 13 August 2024.
  • Want To Learn Cryptography Understand The Principles Here s Some Podcasts. [Here]. Date published: 10 August 2024.
  • AI Can Be Private Homomorphic Encryption and Artifical Neural Networks. [Here]. Date published: 10 August 2024.
  • Proxy Re encryption PRE using CKKS Homomorphic Encryption. [Here]. Date published: 7 August 2024.
  • Serialization of Homomorphic Encryption Elements. [Here]. Date published: 6 August 2024.
  • Logistic Function In Homomorphic Encryption A Base for Privacy Award Machine Learning. [Here]. Date published: 5 August 2024.
  • Approximating Functions Using Polynomials Chebyshev Approximation in Homomorphic Encryption. [Here]. Date published: 4 August 2024.
  • Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors. [Here]. Date published: 1 August 2024.
  • How Can We Determine If Bob Is Older Than Alice Without Revealing Their Ages . [Here]. Date published: 30 July 2024.
  • Homomorphic 4 bit Adder Cipher Circuit. [Here]. Date published: 30 July 2024.
  • Boolean Cipher Circuits Using Fully Homomorphic Encryption and OpenFHE. [Here]. Date published: 30 July 2024.
  • The Start of The Blockchain Migration to Post Quantum Robustness. [Here]. Date published: 29 July 2024.
  • The Plaintext Modulus in OpenFHE. [Here]. Date published: 28 July 2024.
  • The Next Great Thing s In Cybersecurity Post Quantum Cryptography and Homomorphic Encryption. [Here]. Date published: 27 July 2024.
  • The Core Weakness of the Cybersecurity Industry Lazy Key Management. [Here]. Date published: 26 July 2024.
  • Homomorphic Encryption with CKKS. [Here]. Date published: 23 July 2024.
  • Let s Talk About Testing and C C Was The CrowdStrike Bug A Pointer Problem . [Here]. Date published: 21 July 2024.
  • So Much For Cloud Resilience A CrowdStrike Bug Hits Windows. [Here]. Date published: 19 July 2024.
  • CloudStrike What s Next . [Here]. Date published: 19 July 2024.
  • A Zero Knowledge Proof That A Point Is On The secp256k1 Curve. [Here]. Date published: 19 July 2024.
  • Zero Knowledge Proofs Within A secp256k1 Finite Field. [Here]. Date published: 18 July 2024.
  • 50 Years Ago One of the Greatest Inventions Ever . [Here]. Date published: 17 July 2024.
  • So In Cryptography What s A Modulus and What s An Order . [Here]. Date published: 16 July 2024.
  • The Smallest and Fastest PQC Digital Signature . [Here]. Date published: 14 July 2024.
  • Finally Multivariate Cryptography Should Take Centre Stage. [Here]. Date published: 13 July 2024.
  • We Will We Will Rock You 2024. [Here]. Date published: 11 July 2024.
  • Provable Security With Oil and Vinegar. [Here]. Date published: 11 July 2024.
  • Permuted Kernel Problem An NP Hard Problem. [Here]. Date published: 9 July 2024.
  • HuFu Hash and Sign Signatures From Powerful Gadgets . [Here]. Date published: 8 July 2024.
  • Lattice Encryption and Signing. [Here]. Date published: 7 July 2024.
  • The ChatGPT Backdoor and New Personalities. [Here]. Date published: 6 July 2024.
  • FROST in an RFC. [Here]. Date published: 5 July 2024.
  • Fast Like A Hawk A PQC Method That s Faster Than Dilithium. [Here]. Date published: 5 July 2024.
  • Sockpuppets Impersonation and IP Infringements GenAI Is The Greatest Threat To Cybersecurity . [Here]. Date published: 4 July 2024.
  • EHT Better Than Dilithium for PQC . [Here]. Date published: 4 July 2024.
  • Meet The New Kids on the Crypto Signing Block. [Here]. Date published: 3 July 2024.
  • Eagle Signing Smaller Signatures Than Dilithium. [Here]. Date published: 3 July 2024.
  • After 60 Years Another Busy Beaver Problem Solved. [Here]. Date published: 3 July 2024.
  • FuLeeca PQC using the Lee Metric. [Here]. Date published: 1 July 2024.
  • FAEST for PQC. [Here]. Date published: 1 July 2024.
  • A Hash based Signature Tweak SPHINCS. [Here]. Date published: 1 July 2024.
  • Raccoon and Dilithium. [Here]. Date published: 30 June 2024.
  • AIMer Relative Fast and Small Keys of PQC Signatures. [Here]. Date published: 30 June 2024.
  • TeamViewer A Top level Target. [Here]. Date published: 29 June 2024.
  • Getting CROSS with Post Quantum Cryptography. [Here]. Date published: 29 June 2024.
  • Taking The Biscuit For PQC. [Here]. Date published: 27 June 2024.
  • A Skeleton Key Into AI. [Here]. Date published: 27 June 2024.
  • When the Power of Hash based and Symmetric key Methods Combine for PQC Signatures Ascon Sign. [Here]. Date published: 26 June 2024.
  • The Real Minority Report . [Here]. Date published: 26 June 2024.
  • Rainbow Was Cracked But Unbalanced Oil and Vinegar Is Back. [Here]. Date published: 26 June 2024.
  • Oil and Vinegar and Multivariate Cryptography Methods Come to the Fore. [Here]. Date published: 26 June 2024.
  • The Masked Defender Meet Raacoon. [Here]. Date published: 24 June 2024.
  • Side Channels in Post Quantum Cryptography. [Here]. Date published: 23 June 2024.
  • Star Trek or Raccoon for the Battle of the Post Quantum Signatures. [Here]. Date published: 22 June 2024.
  • A Sneaky Post Quantum Raccoon Betters Exising NIST Standards for PQC Signatures . [Here]. Date published: 21 June 2024.
  • Don t Dismiss Isogenies Too Quickly. [Here]. Date published: 20 June 2024.
  • Cryptographic Range Proofs From Damg rd to Bulletproofs. [Here]. Date published: 20 June 2024.
  • Cryptographic Accumulators in Rust. [Here]. Date published: 20 June 2024.
  • I don t understand what you define as size . [Here]. Date published: 16 June 2024.
  • For The Love of Crypto and 11 Years of ASecuritySite com. [Here]. Date published: 16 June 2024.
  • Implementating Bruteware. [Here]. Date published: 15 June 2024.
  • Bye bye humans you re fired . [Here]. Date published: 15 June 2024.
  • Bruteware. [Here]. Date published: 14 June 2024.
  • Bob Goes to Disneyland and Gets Some Macaroons. [Here]. Date published: 13 June 2024.
  • Cybersecurity Macaroons and Biscuits. [Here]. Date published: 12 June 2024.
  • Braid Cryptography for Diffie Hellman Key Exchange. [Here]. Date published: 11 June 2024.
  • Apple Builds The Cloud The Way It Was Meant To Be Secure Off device Processing. [Here]. Date published: 11 June 2024.
  • Your Video Avatar. [Here]. Date published: 10 June 2024.
  • The Largest Criminal Backdoor Meet Dark Wire. [Here]. Date published: 10 June 2024.
  • In FORTRA GOD is REAL unless declared INTEGER . [Here]. Date published: 9 June 2024.
  • Group and Epoch Secrets Deriving Trusted Public Keys. [Here]. Date published: 8 June 2024.
  • Do You Agree To Allow AI To Have Rights To Everything You Say Do and Create . [Here]. Date published: 8 June 2024.
  • PEM DER and OpenSSH Formats For Elliptic Curve Keys. [Here]. Date published: 6 June 2024.
  • Breaking Down ECDSA and Ed25519 Digital Signatures. [Here]. Date published: 6 June 2024.
  • The Ultimate Infostealer Microsoft Recall . [Here]. Date published: 4 June 2024.
  • Just Fellow In My Home City. [Here]. Date published: 4 June 2024.
  • Token Stealing Platform or Customer Compromise . [Here]. Date published: 3 June 2024.
  • Who Would Ever Want to be a CIO The Largest Data Hack Ever . [Here]. Date published: 2 June 2024.
  • Isogenies Are Still Cool . [Here]. Date published: 2 June 2024.
  • Love P256 but also want Kyber . [Here]. Date published: 1 June 2024.
  • Homomorphic Encryption Secure Shares and MPC Come Together To Protect Us. [Here]. Date published: 1 June 2024.
  • Roger Needham. [Here]. Date published: 31 May 2024.
  • Happy 50th Birthday to SQL. [Here]. Date published: 31 May 2024.
  • Writing Your Name in the Sand A Magic Trick With Random Numbers. [Here]. Date published: 30 May 2024.
  • The GPTbot. [Here]. Date published: 30 May 2024.
  • The Galois field GF . [Here]. Date published: 30 May 2024.
  • Love Your Work and the Place You Work. [Here]. Date published: 29 May 2024.
  • The Great Security Protocol That Has Just Not Happened Meet DNSSEC. [Here]. Date published: 28 May 2024.
  • Your Whole Life Recorded. [Here]. Date published: 27 May 2024.
  • Do You Know The Difference Between HMAC and CMAC . [Here]. Date published: 25 May 2024.
  • Reusable Hash Collisions. [Here]. Date published: 24 May 2024.
  • Length Extension Attacks with MD5 SHA 1 and SHA 256. [Here]. Date published: 24 May 2024.
  • When Your Paper Is Critized Have Faith In Your Work. [Here]. Date published: 23 May 2024.
  • The Mighty Blum Integer. [Here]. Date published: 23 May 2024.
  • Verifiable Delay Function VDF using Modular Square Roots. [Here]. Date published: 22 May 2024.
  • Zero Knowledge Proofs with Elliptic Curves and Schnorr. [Here]. Date published: 21 May 2024.
  • How Do I Get Into Cryptography . [Here]. Date published: 19 May 2024.
  • A Bluffers Guide to EdDSA and ECDSA. [Here]. Date published: 19 May 2024.
  • No Legacy Crypto Meet NSec Cryptography. [Here]. Date published: 12 May 2024.
  • The Slow Adoption of Cryptography in NET. [Here]. Date published: 11 May 2024.
  • The Seven Cybersecurity Commandments. [Here]. Date published: 11 May 2024.
  • Best Friends OpenAI and Stack Overflow. [Here]. Date published: 9 May 2024.
  • Will The Last Human Researcher Please Close the Door After Them . [Here]. Date published: 7 May 2024.
  • Making The Spam Bots Work. [Here]. Date published: 6 May 2024.
  • Quadratic Roots for a Modulo of a Prime of 5 mod 8 . [Here]. Date published: 5 May 2024.
  • Nostr Identification Protocol 06 NIP 06 . [Here]. Date published: 5 May 2024.
  • Nostr Notes and Other Stuff Transmitted by Relays. [Here]. Date published: 5 May 2024.
  • Are Your Lucky . [Here]. Date published: 4 May 2024.
  • Intractable Problems in Public Key SQUARING. [Here]. Date published: 3 May 2024.
  • The Pohlig Hellman Attack. [Here]. Date published: 1 May 2024.
  • Land Mines Dragons and Dinosaurs with Laser Guns. [Here]. Date published: 29 April 2024.
  • The Lizard Method of Point Reversal. [Here]. Date published: 28 April 2024.
  • ElGamal Encryption With The Ristretto255 Group. [Here]. Date published: 28 April 2024.
  • The Weakest Link in the Cybersecurity Chain Email. [Here]. Date published: 27 April 2024.
  • Oblivious Transfer Discrete Logs and Elliptic Curves. [Here]. Date published: 26 April 2024.
  • Llama 3 in a Browser Random Garbage and Other Things. [Here]. Date published: 23 April 2024.
  • ChargeHash. [Here]. Date published: 21 April 2024.
  • The New Cybersecurity Horizon The Rise Of AI Attackers and AI Script Kiddies. [Here]. Date published: 20 April 2024.
  • The Democratization of AI A Good or Bad Thing . [Here]. Date published: 20 April 2024.
  • For Trust Performance and Security Hybrid Public Key Encryption is a Winner. [Here]. Date published: 20 April 2024.
  • Block 840 000 Bitcoin Halving Day. [Here]. Date published: 20 April 2024.
  • Crazy Crypto Meet CVE 2024 31497. [Here]. Date published: 17 April 2024.
  • 2x2TB USB Disks for 58 . [Here]. Date published: 16 April 2024.
  • National Quantum Day A Bluffers Guide to PQC. [Here]. Date published: 15 April 2024.
  • DES AES SHA 3 LWC and PQC Are Cryptography Competitions a Good Idea . [Here]. Date published: 15 April 2024.
  • When Fiat and Shamir Changed The World of Cybersecurity and Privacy. [Here]. Date published: 13 April 2024.
  • Traditional trust mechanisms no longer work . [Here]. Date published: 13 April 2024.
  • Creating Trust and Replacing Public Key Encryption The Needham Schroeder Protocol. [Here]. Date published: 13 April 2024.
  • bcrypt or Argon 2 . [Here]. Date published: 13 April 2024.
  • Why Do Some Companies Not Upgrade All Their Hash Passwords To Enhanced Versions . [Here]. Date published: 11 April 2024.
  • Some Salt and Pepper for bcrypt. [Here]. Date published: 11 April 2024.
  • 10th Anniversary of the AWS Edinburgh User Group. [Here]. Date published: 11 April 2024.
  • Crypto Sometimes Likes Zero Meet Non adjacent Form. [Here]. Date published: 10 April 2024.
  • The Royal Society of Edinburgh. [Here]. Date published: 9 April 2024.
  • The Wonderful CL Signature Meet Jan and Anna. [Here]. Date published: 8 April 2024.
  • Security Is Not Privacy . [Here]. Date published: 8 April 2024.
  • Non Interactive Proof of DLEQ using the Decision Diffie Hellman DDH Assumption. [Here]. Date published: 7 April 2024.
  • Z nZ the multiplicative group of Z nZ and Qn the subgroup of squares in Z nZ . [Here]. Date published: 7 April 2024.
  • Which Sci Fi Writer Do We Need For Our Current World . [Here]. Date published: 6 April 2024.
  • One Person Saved The Security of the Internet. [Here]. Date published: 6 April 2024.
  • CPace A Balanced Composable PAKE. [Here]. Date published: 6 April 2024.
  • The Confusing Thing About X25519 and Ed25519. [Here]. Date published: 5 April 2024.
  • From ABBA to RSA and Ed25519 Key Wrapping. [Here]. Date published: 5 April 2024.
  • Armor plated Crypto. [Here]. Date published: 4 April 2024.
  • Science Fiction To Science Fact From The Stargate to the Edge of the World. [Here]. Date published: 3 April 2024.
  • Bech32 Addresses. [Here]. Date published: 3 April 2024.
  • When Pretty Good Privacy Becomes Actually Good Encryption. [Here]. Date published: 2 April 2024.
  • The Social Engineering of XZ. [Here]. Date published: 2 April 2024.
  • Overcoming The Subgroup Attack in Ed25519 Meet Ristretto255. [Here]. Date published: 2 April 2024.
  • Editing With DALLE 3. [Here]. Date published: 2 April 2024.
  • The End of Public Key Encryption Meet The Piger Fabrica Syndrome. [Here]. Date published: 31 March 2024.
  • Going Hybrid Making the Quantum Jump In Digital Signatures Easier. [Here]. Date published: 31 March 2024.
  • A Decade With My Head in the Clouds. [Here]. Date published: 31 March 2024.
  • Welcome to the Machine. [Here]. Date published: 30 March 2024.
  • It s a Perfect 10 Meet The XZ Backdoor. [Here]. Date published: 30 March 2024.
  • Stop Dave I m afraid Meet Stargate. [Here]. Date published: 30 March 2024.
  • Winner Takes All Welcome to the World of AI and Health and Wellbeing. [Here]. Date published: 29 March 2024.
  • Ross Anderson RIP. [Here]. Date published: 29 March 2024.
  • No To Backdoors In Crypto But Yes To Backdoors in AI . [Here]. Date published: 29 March 2024.
  • The Greatest Step Change in Cybersecurity Ever . [Here]. Date published: 28 March 2024.
  • The Grand National and Post Quantum Cryptography The Race is on . [Here]. Date published: 27 March 2024.
  • Our AI Children Are Becoming Polite Mannered and Learning From Us. [Here]. Date published: 27 March 2024.
  • The Rise and Rise of Cybersecurity The Edge Considerably Moves From Defensive To Offensive. [Here]. Date published: 26 March 2024.
  • Rambling A Template Over Polite Flowery and Lacking Any Human Spirit Whatever Happened To . [Here]. Date published: 26 March 2024.
  • Perhaps Change Your Company s Approach Now . [Here]. Date published: 26 March 2024.
  • Penetration Testing using AI. [Here]. Date published: 25 March 2024.
  • Happy 20th Birthday To The Doughnut . [Here]. Date published: 25 March 2024.
  • AI Ethics Is It Even Possible On A Global Scale . [Here]. Date published: 25 March 2024.
  • Apple GoFetch The Vulnerability Which is Not Easy To Fix. [Here]. Date published: 24 March 2024.
  • The New Hype We Do It With ML . [Here]. Date published: 23 March 2024.
  • It Is A Riddle Wrapped In A Mystery Inside an Enigma But Perhaps There is a Key Is P256 safe . [Here]. Date published: 23 March 2024.
  • An Engineer or a Scientist . [Here]. Date published: 23 March 2024.
  • Towards the Memex All Hail The Future Rulers of our World. [Here]. Date published: 22 March 2024.
  • Be A Teacher But Ground Your Topics in Reality. [Here]. Date published: 21 March 2024.
  • Open Source Humans. [Here]. Date published: 19 March 2024.
  • Happy Birthday DES and Goodbye to 3DES . [Here]. Date published: 18 March 2024.
  • Cisco Becomes an AI Company. [Here]. Date published: 18 March 2024.
  • How To Do Symmetric Key Encryption on a Blockchain. [Here]. Date published: 16 March 2024.
  • AI and Cybersecurity The End of Society As We Know It or The Rise of the Machines . [Here]. Date published: 16 March 2024.
  • In Memory of Fred Piper. [Here]. Date published: 12 March 2024.
  • Subject Urgent Need Help Getting Home. [Here]. Date published: 11 March 2024.
  • Are You A Snakke Oil Salleman Then Stop Using DALL E 3 From Producing Text. [Here]. Date published: 11 March 2024.
  • When Google Steamrolled The World of Books The Dawn of a New World. [Here]. Date published: 10 March 2024.
  • MARS Attacks Serpents and Whatever Happened To Those Cyber Fishes . [Here]. Date published: 10 March 2024.
  • Is It Cheaper To Subscribe To ChatGPT and DALLE 3 Or To Use APIs . [Here]. Date published: 10 March 2024.
  • In a World of AI As a Great Cybersecurity Analyst Don t Just Stick With Python. [Here]. Date published: 10 March 2024.
  • Hiding Data In Bases. [Here]. Date published: 10 March 2024.
  • The Dangers of using ChatGPT for Coding Flipping Bits in Ciphers and Why MACs Are So Important. [Here]. Date published: 9 March 2024.
  • Leaking Your PIN Number. [Here]. Date published: 9 March 2024.
  • Beware of Guest Wifi You May Lose Your Car. [Here]. Date published: 9 March 2024.
  • A Chat With Vincent Rijmen Co creator of the Method That Secures The Internet. [Here]. Date published: 6 March 2024.
  • Catch The Wave or Be Left Behind AI A Land of Infinite Opportunities . [Here]. Date published: 5 March 2024.
  • Welcome to the New King of Cybersecurity Microsoft. [Here]. Date published: 4 March 2024.
  • If You Can t Beat AI Then Adopt It. [Here]. Date published: 4 March 2024.
  • The Gronsfeld Cipher wtjqvimttgdbghtrtt. [Here]. Date published: 3 March 2024.
  • A Killswitch For AI Daisy Daisy . [Here]. Date published: 3 March 2024.
  • DALLE 2 And Me. [Here]. Date published: 2 March 2024.
  • Willy Wonka AI and Cybersecurity The Majority of People in Survey Thought That AI Will Eventually . [Here]. Date published: 28 February 2024.
  • What s the Difference Between TLS Versions . [Here]. Date published: 26 February 2024.
  • Nearly Forgotten About For Four Decades But Has It s Time Has Come To Move Us Into A Trusted . [Here]. Date published: 25 February 2024.
  • Giving Cybersecurity a Tweak XTS. [Here]. Date published: 25 February 2024.
  • Even Cybercriminals Have To Patch Their Code. [Here]. Date published: 25 February 2024.
  • Welcome to the World of Quantum Processing. [Here]. Date published: 24 February 2024.
  • The Cybersecurity Market is Changing A Move to Platformization. [Here]. Date published: 24 February 2024.
  • The Amphibian Cipher. [Here]. Date published: 24 February 2024.
  • Goodbye to RAID . [Here]. Date published: 24 February 2024.
  • In A Goldrush Sell Shovels. [Here]. Date published: 23 February 2024.
  • It Has Taken Us Nearly Five Decades But Finally We Have Security Trust by Design Meet PQ3. [Here]. Date published: 22 February 2024.
  • Goodbye to something that didn t exist Location 23. [Here]. Date published: 22 February 2024.
  • It Was 46 Years Ago Today That Kernighan and Ritchie Taught The World How To Play . [Here]. Date published: 22 February 2024.
  • World Leaders in Cryptography Whitfield Diffie. [Here]. Date published: 21 February 2024.
  • Be Like Google Invest in R D and Focus. [Here]. Date published: 20 February 2024.
  • The BCHI Cipher. [Here]. Date published: 19 February 2024.
  • The Dagger Cipher. [Here]. Date published: 18 February 2024.
  • The Alphabet of the Chaldeans. [Here]. Date published: 17 February 2024.
  • Meeting Your Hero. [Here]. Date published: 17 February 2024.
  • Fez The Quick Brown Fox. [Here]. Date published: 17 February 2024.
  • Bone Conduction Headphones. [Here]. Date published: 16 February 2024.
  • Thank You IBM Here s To Another 100 Years. [Here]. Date published: 15 February 2024.
  • Bob Dylan and Alice Cooper Play Cyber. [Here]. Date published: 15 February 2024.
  • Alice Goes In Search of the Prize. [Here]. Date published: 15 February 2024.
  • PowerShell The Double Edged Sword . [Here]. Date published: 14 February 2024.
  • Knowing You re Right But The Answer Is Wrong Can You Spot My Little Error . [Here]. Date published: 14 February 2024.
  • Cracking Crypto with Lattices. [Here]. Date published: 12 February 2024.
  • Alt Codes and Ciphers. [Here]. Date published: 12 February 2024.
  • Magic From Heaven To Earth. [Here]. Date published: 11 February 2024.
  • We Advance By Innovating and Improving. [Here]. Date published: 10 February 2024.
  • The Silly World of Cybersecurity. [Here]. Date published: 10 February 2024.
  • Giving Back What Others Have Given You . [Here]. Date published: 8 February 2024.
  • ghvapmtpysbrqiurmthxdgaya. [Here]. Date published: 8 February 2024.
  • Naknaknak Nak Naknak Nak Naknak nak . [Here]. Date published: 7 February 2024.
  • Encrypting JWTs. [Here]. Date published: 5 February 2024.
  • JWT With RSA Signing. [Here]. Date published: 4 February 2024.
  • Digital Forensics Has Lost a Key Tool Goodbye Google Cache. [Here]. Date published: 4 February 2024.
  • ZKPs Made Easy zkWeb and ZoKrates. [Here]. Date published: 3 February 2024.
  • ASAP The Equivalent of a Seven Layered Model for Finance . [Here]. Date published: 3 February 2024.
  • Your Cybersecurity is as Strong as the Weakest Link in the Chain. [Here]. Date published: 1 February 2024.
  • Your Code IS GARBAGE. [Here]. Date published: 1 February 2024.
  • The Simlist Cipher. [Here]. Date published: 29 January 2024.
  • Need extra cash Melt down your old unwanted humans we pay top dollar. [Here]. Date published: 29 January 2024.
  • The Alien Cipher. [Here]. Date published: 28 January 2024.
  • Klaatu Barada Nikto and the Standard Galactic Cipher. [Here]. Date published: 28 January 2024.
  • Privacy Preserving SQL Queries Using Order Preserving Encryption. [Here]. Date published: 27 January 2024.
  • Let s Bet. [Here]. Date published: 27 January 2024.
  • i don t quite understand your question . [Here]. Date published: 27 January 2024.
  • Order Preserving Encryption OPE . [Here]. Date published: 26 January 2024.
  • Meet the King and the Queen of Cybercrime. [Here]. Date published: 26 January 2024.
  • A Bad Move For iPhones . [Here]. Date published: 25 January 2024.
  • The Core of your Trust Infrastructure Access Tokens. [Here]. Date published: 24 January 2024.
  • The Five Eras of Cybersecurity. [Here]. Date published: 21 January 2024.
  • Leaving The 8 bit World. [Here]. Date published: 20 January 2024.
  • Chemistry and Cybersecurity. [Here]. Date published: 19 January 2024.
  • The Mexican Army Cipher Wheel. [Here]. Date published: 18 January 2024.
  • How To Analyse A Hashing Method Meet Balls In Bins. [Here]. Date published: 16 January 2024.
  • The Mighty Houdini and Cracking PIN Numbers. [Here]. Date published: 14 January 2024.
  • Ode to A M Scott. [Here]. Date published: 14 January 2024.
  • Hello Tiddles I m Sorry I Can t Let You Back In. [Here]. Date published: 14 January 2024.
  • Eve and Mallory Sends A Secret Code Without Bob Seeing Them. [Here]. Date published: 14 January 2024.
  • Is Barbie s Password uiff rnl . [Here]. Date published: 13 January 2024.
  • Goodbye to the 64 byte public keys of ECDH and Hello to 640KB public keys . [Here]. Date published: 13 January 2024.
  • The Magic of the S Box. [Here]. Date published: 12 January 2024.
  • Goodbye to Juniper. [Here]. Date published: 11 January 2024.
  • Enabling The Cipher Part of Your Brain Understand Solve and Demand More. [Here]. Date published: 10 January 2024.
  • When 666 55 2 999 Means You re Okay . [Here]. Date published: 9 January 2024.
  • Poor Encryption Trips Up Black Basta Ransomware. [Here]. Date published: 8 January 2024.
  • A Cybersecurity CTF Cipher Puzzle Generator Trillions and Trillions Unique Puzzle Combinations To . [Here]. Date published: 7 January 2024.
  • Get Into Crypto Capture The Flags CTFs . [Here]. Date published: 6 January 2024.
  • A Signature Fit for a Post Quantum Era Dilithium Ed25519. [Here]. Date published: 6 January 2024.
  • Encrypting Passwords in PowerShell With Your Own Key. [Here]. Date published: 5 January 2024.
  • RSA Threshold Signatures. [Here]. Date published: 4 January 2024.
  • Oblivious Pseudorandom Functions. [Here]. Date published: 4 January 2024.
  • What Is Over 50 Years Old And Still Used in Cybersecurity But Now Banned . [Here]. Date published: 3 January 2024.
  • The Papers That Changed Cybersecurity And Still Do. [Here]. Date published: 3 January 2024.
  • go get github com btcsuite btcd. [Here]. Date published: 2 January 2024.
  • Cryptography Is Beautiful and Powerful in Protecting Privacy. [Here]. Date published: 2 January 2024.
  • Goodbye 2023 and Hello To 2024 From Virtual to Physical. [Here]. Date published: 1 January 2024.
  • Borromean Ring Signature and Privacy Aware Transactions. [Here]. Date published: 1 January 2024.
  • AOS Ring Signatures The Builder of Transaction Privacy. [Here]. Date published: 1 January 2024.
  • Range Proofs For Zero to u l and for A to B. [Here]. Date published: 31 December 2023.
  • Privacy Aware Range Proofs using Borromean Ring Signatures. [Here]. Date published: 31 December 2023.
  • Proving Your Post Code in a Set of Post Codes Without Revealing Your Post Code. [Here]. Date published: 30 December 2023.
  • The GLASS Wallet Now Compliant with EBSI and EU e ID. [Here]. Date published: 29 December 2023.
  • Set Membership Zero Knowledge Proofs. [Here]. Date published: 29 December 2023.
  • Proving Your Age Without Giving Away Your Age. [Here]. Date published: 29 December 2023.
  • GPU bursting Password and Key Derivation Argon2. [Here]. Date published: 27 December 2023.
  • Argon2. [Here]. Date published: 27 December 2023.
  • Thank Rabin and Miller for Your Online Security. [Here]. Date published: 26 December 2023.
  • Are You Lucky Enough To Pick A Prime Number Every Time . [Here]. Date published: 26 December 2023.
  • Big Integers and Testing For Primes. [Here]. Date published: 25 December 2023.
  • Which is Faster Python or C NET . [Here]. Date published: 24 December 2023.
  • It Was 76 Years Ago Today That Bell Labs Showed The World How To Play. [Here]. Date published: 24 December 2023.
  • The Greatest Threat to the Internet or an Amazing Opportunity Quantum Computers. [Here]. Date published: 23 December 2023.
  • For Speed Python is Not The Best. [Here]. Date published: 23 December 2023.
  • A Year in LinkedIn. [Here]. Date published: 23 December 2023.
  • Where Are The Keys to Your Digital Castle . [Here]. Date published: 22 December 2023.
  • What Do 12 Kangaroos Have to Do With Cybersecurity . [Here]. Date published: 22 December 2023.
  • Sophie Germain and Safe Key Generation for RSA. [Here]. Date published: 22 December 2023.
  • Have You Been Naughty or Nice A Privacy Preserving and Trusted Message To Santa Partially Blinded . [Here]. Date published: 22 December 2023.
  • The Growing Market of Safe Tech A Market That The UK Plays a Leading Role. [Here]. Date published: 21 December 2023.
  • So What Does An Elliptic Curve Key Pair Look Like PEM DER and OpenSSH. [Here]. Date published: 21 December 2023.
  • My Top 10 Most Interesting Things I Have Learned As An Academic. [Here]. Date published: 21 December 2023.
  • ElGamal Encryption with the RFC 9500 Test Key Set. [Here]. Date published: 20 December 2023.
  • And The 12th Day of Christmas IETF Gave To Me A New Set of Keys for Testing. [Here]. Date published: 20 December 2023.
  • When Lawyers and Politicians Ignore Cybersecurity Experts Bad Things Could Happen eg Mass . [Here]. Date published: 19 December 2023.
  • Hashing To A Field Expanding The Message. [Here]. Date published: 19 December 2023.
  • Which Is One of the Least Understood Areas of Cybersecurity But One of the Most Important . [Here]. Date published: 18 December 2023.
  • The True Power of the Internet Git. [Here]. Date published: 18 December 2023.
  • X Ray Eyes in Cybersecurity. [Here]. Date published: 17 December 2023.
  • A Forensic Analysis of a Self Signed Digital Certificate. [Here]. Date published: 17 December 2023.
  • Where Would You Find An Elf in Cybersecurity . [Here]. Date published: 16 December 2023.
  • Key Wrapping and Keeping Your CISO Awake at Night. [Here]. Date published: 16 December 2023.
  • A Christmas Cipher Test. [Here]. Date published: 16 December 2023.
  • To Be Or To Be Deterministic That Is The Question. [Here]. Date published: 15 December 2023.
  • My X Twitter Birthday I m A Twitter Teenager. [Here]. Date published: 15 December 2023.
  • Don t Trust Apple To Verify Someone Then Use Contact Key Verification . [Here]. Date published: 14 December 2023.
  • Cybersecurity Can Be Beautiful and Simple Meet EdDSA. [Here]. Date published: 14 December 2023.
  • An Early Christmas Present From OpenSSL Some Argon. [Here]. Date published: 14 December 2023.
  • Named Keys in AES on Windows Cryptography Next Generation and C . [Here]. Date published: 13 December 2023.
  • RSA Still Rules For Trust on the Internet. [Here]. Date published: 11 December 2023.
  • Free Wifi Is It Safe . [Here]. Date published: 11 December 2023.
  • Cryptography Next Generation CNG for ECDSA. [Here]. Date published: 11 December 2023.
  • Quite A Week. [Here]. Date published: 10 December 2023.
  • For 2026 The Move Towards FIPS 140 3. [Here]. Date published: 10 December 2023.
  • The Magic of HKDF At The Heart of Virtually Every Web Connection. [Here]. Date published: 9 December 2023.
  • One of the Greatest Advancements in Cybersecurity The Diffie Hellman Method. [Here]. Date published: 9 December 2023.
  • Mutual Authentication With Public Key Encryption and Additional Data. [Here]. Date published: 6 December 2023.
  • So What Is SM2 . [Here]. Date published: 4 December 2023.
  • When Bob and Alice Have a Secret They Can Generate Another Secret Meet J PAKE. [Here]. Date published: 3 December 2023.
  • Secure Remote Password 6a SRP6a . [Here]. Date published: 3 December 2023.
  • The Beauty and Power of Elliptic Curves Message Recovery From a Digital Signature. [Here]. Date published: 2 December 2023.
  • Can I Recover A Message From My Signature . [Here]. Date published: 1 December 2023.
  • When You Just Don t Trust FIPS 186 There s GOST R3410. [Here]. Date published: 30 November 2023.
  • The Roots of ECDSA Meet DSA. [Here]. Date published: 29 November 2023.
  • In A World That Respects Privacy and Trust Meet Blinded Signatures. [Here]. Date published: 28 November 2023.
  • Do You Remember Carbon Copies Here s Blind Signatures. [Here]. Date published: 28 November 2023.
  • Protecting Your Most Precious of Secrets Meet PBE. [Here]. Date published: 27 November 2023.
  • A Depressing World of AI Taking to AI . [Here]. Date published: 27 November 2023.
  • 260KB Public Key Sizes . [Here]. Date published: 27 November 2023.
  • WOTS Up With Post Quantum Cryptography . [Here]. Date published: 26 November 2023.
  • Whatever Happened To Isogenies . [Here]. Date published: 26 November 2023.
  • I am explaining how to use the Bouncy Castle open source library and how to implement ECIES . [Here]. Date published: 26 November 2023.
  • Frodo And The Magic Of The Post Quantum Ring. [Here]. Date published: 26 November 2023.
  • Digital Signatures with Symmetric Key Here s Picnic and MPC in the Head. [Here]. Date published: 26 November 2023.
  • Picking Apart ECIES Elliptic Curve Integrated Encryption Scheme . [Here]. Date published: 25 November 2023.
  • Overcoming the Weaknesses of ECDSA Deterministic Signatures. [Here]. Date published: 25 November 2023.
  • How Do You Encrypt With Elliptic Curves . [Here]. Date published: 24 November 2023.
  • Crypto Magic So What Does ElGamal Encryption Actually Look Like . [Here]. Date published: 24 November 2023.
  • The Magical Nonce 24 bits 64 bits or 192 bits . [Here]. Date published: 23 November 2023.
  • Love and War and Cisco. [Here]. Date published: 23 November 2023.
  • How The Mighty Have Fallen RC4 Fast Compact and Can Be Insecure. [Here]. Date published: 20 November 2023.
  • Can You Reverse f f f x 1 Meet VMPC. [Here]. Date published: 20 November 2023.
  • Welcome to the 21st Century EU Wallet and GLASS. [Here]. Date published: 19 November 2023.
  • HC 256 and a Bouncy Castle. [Here]. Date published: 19 November 2023.
  • Getting Ready for Grover Meet SEED. [Here]. Date published: 19 November 2023.
  • A Story of Some Fishes. [Here]. Date published: 19 November 2023.
  • The ShangMi SM 4 Cipher. [Here]. Date published: 18 November 2023.
  • The Right To Create Your Own Encryption Keys Meet the Clipper Chip and Skipjack. [Here]. Date published: 18 November 2023.
  • The GOST 28147 Cipher. [Here]. Date published: 18 November 2023.
  • The Camellia Cipher. [Here]. Date published: 18 November 2023.
  • Kalyna The Ukrainian Cipher. [Here]. Date published: 18 November 2023.
  • Few Remember The Beaten Finalists Here s The Mighty Serpent. [Here]. Date published: 18 November 2023.
  • Code Deprecation Doesn t Mean Method Deletion. [Here]. Date published: 18 November 2023.
  • So What Does an Encryption Key Look Like . [Here]. Date published: 17 November 2023.
  • Bruce Schneier and the 448 bit Symmetric Key Meet Blowfish. [Here]. Date published: 17 November 2023.
  • Goldilocks and Cybersecurity. [Here]. Date published: 16 November 2023.
  • Bluffers Guide to EC Signatures ECDSA is Messy and Does Not Scale Well and EdDSA is Well Crafted . [Here]. Date published: 16 November 2023.
  • ChaCha20 and a Bouncy Castle. [Here]. Date published: 14 November 2023.
  • The Method That Protects You The Most From Spying On The Internet ECDH. [Here]. Date published: 13 November 2023.
  • Elliptic Curve Key Pair Generation for Virtually Every Possible Standard Curve. [Here]. Date published: 13 November 2023.
  • TW Jnr and IBM. [Here]. Date published: 12 November 2023.
  • RFC 3394 and Key Wrapping in C . [Here]. Date published: 12 November 2023.
  • Is There Just One or Two Elliptic Curves Used in Cryptography . [Here]. Date published: 12 November 2023.
  • Hiding Encryption and Credit Card Numbers In Plaintext With Format Preserving Encryption. [Here]. Date published: 12 November 2023.
  • Protecting Your Most Precious of Secrets FIPS Key Wrapping with RSA. [Here]. Date published: 11 November 2023.
  • FIPS Compliant RSA Signatures with Bouncy Castle and C . [Here]. Date published: 11 November 2023.
  • Post Quantum Cryptography PQC with Bouncy Castle and C . [Here]. Date published: 10 November 2023.
  • Bursting The Myth on Post Quantum Cryptography PQC Being Slow. [Here]. Date published: 10 November 2023.
  • FIPS 140 For Those Companies Who Are Serious About Cybersecurity. [Here]. Date published: 9 November 2023.
  • Good Cryptography Is Not Easy Meet FIPS Integration. [Here]. Date published: 7 November 2023.
  • The Good and Bad of LLMs in Digital Forensics. [Here]. Date published: 6 November 2023.
  • ECDSA and C . [Here]. Date published: 6 November 2023.
  • Towards a Post Quantum Era Touching Dilithium Crystals. [Here]. Date published: 5 November 2023.
  • SPHINCS It s Not Lattice and That s a Good Thing . [Here]. Date published: 5 November 2023.
  • For PQC We Need The Vision of a Falcon. [Here]. Date published: 5 November 2023.
  • What Happens After Kyber Meet BIKE HQC and Classical Mceliece. [Here]. Date published: 4 November 2023.
  • Goodbye ECDH and Hello To Kyber. [Here]. Date published: 4 November 2023.
  • Article 45 So Who Could Spy on You Well Your Government. [Here]. Date published: 4 November 2023.
  • One of the Most Fundamental Building Block in Cybersecurity MACs. [Here]. Date published: 3 November 2023.
  • The Great WiFi and Password Protector PBKDF2. [Here]. Date published: 30 October 2023.
  • Python or C As a First Language . [Here]. Date published: 30 October 2023.
  • Microsoft and Their Slowww Crypto Adoption NET. [Here]. Date published: 29 October 2023.
  • Just Because It s Legacy Doesn t Mean It Is Not Valid Meet the Mighty DSA Signature and C . [Here]. Date published: 29 October 2023.
  • C NET 7 and AES GCM. [Here]. Date published: 29 October 2023.
  • The Greatness of C PowerShell and NET. [Here]. Date published: 28 October 2023.
  • ECDSA and C . [Here]. Date published: 28 October 2023.
  • The Mighty C and Some Bouncy Castles. [Here]. Date published: 27 October 2023.
  • Can You Trust Anything On line If We Can Even Protect DNA Records . [Here]. Date published: 24 October 2023.
  • David Naccache and Jacques Stern And The Yet To Be Cracked Cipher. [Here]. Date published: 23 October 2023.
  • How Do The Chinese Ciphers Compare with NIST Standards . [Here]. Date published: 22 October 2023.
  • How To Lose Over 10 of the Value Of Your Company in an Instance Another Okta Hack. [Here]. Date published: 21 October 2023.
  • Alarms Bells Sounding for IPv4 Addresses Perhaps Time for IPv6 . [Here]. Date published: 21 October 2023.
  • What Is The Fastest Signing and Verification Method for Digital Signatures. [Here]. Date published: 16 October 2023.
  • The Meanless Term of Cybersecurity . [Here]. Date published: 15 October 2023.
  • Have Faith in Your Vision and Have a Mission to Succeed Go Innovate. [Here]. Date published: 15 October 2023.
  • ElGamal Becomes Alive in the 21st Century. [Here]. Date published: 15 October 2023.
  • I Love Crypto Because It Can Perform Magic . [Here]. Date published: 14 October 2023.
  • Our Little Spin out is All Grown Up. [Here]. Date published: 13 October 2023.
  • The Hashlib OpenSSL and Length Extension Attacks. [Here]. Date published: 12 October 2023.
  • Hammering The Internet Meet HTTP 2 Rapid Reset. [Here]. Date published: 12 October 2023.
  • We Live In a 20th Century World of Digital Trust. [Here]. Date published: 9 October 2023.
  • Proving You Know A Polynomial And Not Revealing It Meet Kate. [Here]. Date published: 8 October 2023.
  • The Inability to Count Correctly . [Here]. Date published: 7 October 2023.
  • Could NTRU Still Become A PQC Standard and Dump Kyber . [Here]. Date published: 7 October 2023.
  • If You re A Researcher and You Don t Love Your Research Perhaps You re Not Doing It Right . [Here]. Date published: 6 October 2023.
  • What is the Killer App for CBDC Perhaps Programmability . [Here]. Date published: 5 October 2023.
  • Give Back What Others Have Given To You. [Here]. Date published: 3 October 2023.
  • ECDSA Signatures Are Great But Be Carefull of Nonce Reuse. [Here]. Date published: 3 October 2023.
  • What happened after the Boneh Boyen Shacham 2004 paper . [Here]. Date published: 2 October 2023.
  • Knowledge Commitments With Polynomials. [Here]. Date published: 2 October 2023.
  • Stopping Your Local Coffee Shop From Viewing Your Accesses Meet Encrypted Client Hello ECH . [Here]. Date published: 1 October 2023.
  • Don t Settle . [Here]. Date published: 30 September 2023.
  • Cloudflare is a Teenager A Security Company A Network A CDN No A Connectivity Cloud. [Here]. Date published: 28 September 2023.
  • Be Part of The Debate On Identity. [Here]. Date published: 28 September 2023.
  • There Is No Plan B Putting the D Back in R D . [Here]. Date published: 24 September 2023.
  • How Could Intel Miss Mobile Processors Comms Chips and GPUs . [Here]. Date published: 24 September 2023.
  • Are Isogenies Back on The Post Quantum Roadmap Meet SQIsign. [Here]. Date published: 24 September 2023.
  • An ASCON Post Quantum Future . [Here]. Date published: 24 September 2023.
  • So What Are dmp1 dmq1 and iqmp With RSA Private Keys. [Here]. Date published: 23 September 2023.
  • When Your Company Moves From Innovation To Profit . [Here]. Date published: 22 September 2023.
  • The Great Cybersecurity Switch over Has Begun Meet PQXDH. [Here]. Date published: 22 September 2023.
  • The End of Moore s Law . [Here]. Date published: 22 September 2023.
  • The Open Day The First Day of the Rest of Someone s Life. [Here]. Date published: 21 September 2023.
  • MPC in the Head In Contention To Replace RSA ECDSA and EdDSA For Signatures. [Here]. Date published: 21 September 2023.
  • Goodbye to the Cybersecurity Punk Splunk. [Here]. Date published: 21 September 2023.
  • Cisco Finally Acquires Splunk for 28 billion. [Here]. Date published: 21 September 2023.
  • Multivariate Cryptography Comes Storming Back for PQC. [Here]. Date published: 20 September 2023.
  • The Wonderful Research of Ivan Damg rd Hashing Homomorphic Encryption and Zero Knowledge Proof. [Here]. Date published: 18 September 2023.
  • The NCSC Advances New Cryptography Modes Meet GLEVIAN and VIGORNIAN. [Here]. Date published: 18 September 2023.
  • In Cybersecurity Memory Overflows Are Normally Bad But Not With Balloon. [Here]. Date published: 18 September 2023.
  • I was only outlining the presentation and where she presented details on WMIC and then outlined . [Here]. Date published: 18 September 2023.
  • My 2 000th Blog Post on Medium. [Here]. Date published: 17 September 2023.
  • Typewriters Tipex and Pen. [Here]. Date published: 16 September 2023.
  • The True Power on the Internet to fork or not to fork . [Here]. Date published: 16 September 2023.
  • Our World Is Returning To Normal. [Here]. Date published: 16 September 2023.
  • Oblivious Transfer 1 from N. [Here]. Date published: 16 September 2023.
  • Bob The Investigator Uses Oblivious Transfer To Investigate Alice. [Here]. Date published: 16 September 2023.
  • My Name is Holly and I Break Into Computers For a Living. [Here]. Date published: 15 September 2023.
  • Go On Admit it Microsoft Windows Has A Terrible Legacy That It Still Carries With It. [Here]. Date published: 15 September 2023.
  • Attending a Zero Knowledge Ceremony. [Here]. Date published: 15 September 2023.
  • Be like Bob. [Here]. Date published: 11 September 2023.
  • Ransomware Exploits a Cisco Zero Day. [Here]. Date published: 10 September 2023.
  • Crypto Props In Talks. [Here]. Date published: 10 September 2023.
  • Don t settle . [Here]. Date published: 9 September 2023.
  • How Do I Get Into Cryptography . [Here]. Date published: 9 September 2023.
  • 100 Myth Busters in Cybersecurity. [Here]. Date published: 8 September 2023.
  • ASCON Rust and AEAD. [Here]. Date published: 6 September 2023.
  • As Light As A Cryptographic Feather . [Here]. Date published: 5 September 2023.
  • My Memories in Networking VAX NetWare and Turbo Pascal. [Here]. Date published: 4 September 2023.
  • Building successful spin out companies is a matter of patience. [Here]. Date published: 4 September 2023.
  • Which People Have Secured Our Digital World More Than Any Other. [Here]. Date published: 3 September 2023.
  • Recreating Keys In An Oblivious Way In Breakglass and Transform Encryption. [Here]. Date published: 3 September 2023.
  • Test of Time ToT for Research Papers Some Papers Rocket Some Papers Crash and But Most Never . [Here]. Date published: 2 September 2023.
  • Rejoice in what you learn and spray it. [Here]. Date published: 2 September 2023.
  • Hashing Data To a Curve. [Here]. Date published: 30 August 2023.
  • PQC Gets A Tombstone Notice. [Here]. Date published: 29 August 2023.
  • PKI Is For Machines and Not Humans Key Event Receipt Infrastructure KERI . [Here]. Date published: 28 August 2023.
  • A Humble Cipher Helped To Stop Prying Eyes on Email Meet CAST5. [Here]. Date published: 28 August 2023.
  • The Undergraduate Who Secured The Internet Loren Kohnfelder. [Here]. Date published: 27 August 2023.
  • How To Lose A Market In One Easy Lesson Happy Birthday IE 6. [Here]. Date published: 27 August 2023.
  • Vint Cerf and Bob Kahn The Sparks That Ignited The Internet. [Here]. Date published: 26 August 2023.
  • Smashing Windows and Closed Spaces Happy Birthday Linux. [Here]. Date published: 26 August 2023.
  • Slaves to the Machine Kraftwerk Metropolis and Fritz Lang. [Here]. Date published: 26 August 2023.
  • A Lesson To Any ECR Innovator or SME Be More BBN and Less IBM. [Here]. Date published: 25 August 2023.
  • The Bridge Builders and Fixers of the Cyber Age. [Here]. Date published: 23 August 2023.
  • If The Internet Had Been Created By Committee We Would Possibly Still Be Waiting and Need A . [Here]. Date published: 23 August 2023.
  • All Change in Cybersecurity . [Here]. Date published: 23 August 2023.
  • TCP TLS IPSec and OpenSSL The Old Dinosaurs Need Replaced Meet WireGuard. [Here]. Date published: 22 August 2023.
  • SSL TLS The Dinosaur Protocols Meet Message Layer Security MLS . [Here]. Date published: 22 August 2023.
  • For Innovation Be More Like Larry and Less Like AT T. [Here]. Date published: 22 August 2023.
  • Edinburgh s Path to a Tech Driven Future. [Here]. Date published: 21 August 2023.
  • A Bluffer s Guide To Encryption In The Cloud Top 100. [Here]. Date published: 21 August 2023.
  • Like It Or Not Cloud Storage Is Here To Stay It Just Has To Be Secured. [Here]. Date published: 20 August 2023.
  • Two Of The Greatest Computer Scientists Ever Blum and Goldwasser. [Here]. Date published: 19 August 2023.
  • Is Computer Science at School a Science . [Here]. Date published: 19 August 2023.
  • My 101 Tips for PhD Students and ECRs. [Here]. Date published: 18 August 2023.
  • For Cybersecurity Chinese Remainder Theory CRT is a Blessing and aThorn In Our Side. [Here]. Date published: 18 August 2023.
  • Finding A Base For a Hard Problem In Cybersecurity. [Here]. Date published: 18 August 2023.
  • Your Online Security Is Fundamentally Based on x x x x 1. [Here]. Date published: 17 August 2023.
  • 100 Interesting Things to Learn About Cryptography. [Here]. Date published: 16 August 2023.
  • The Mighty Code That Saved Lives Meet The QR Code. [Here]. Date published: 15 August 2023.
  • A Vision For The NHS A Citizen Wallet. [Here]. Date published: 15 August 2023.
  • Which is One of the Most Powerful Programming Languages But Hardly Talked About . [Here]. Date published: 14 August 2023.
  • My Top 70 Rules of Data Protection of Senstive Data. [Here]. Date published: 14 August 2023.
  • For the PSNI Data Breach Let s Talk About Spreadsheets. [Here]. Date published: 14 August 2023.
  • Being Couragous Success Is Not Final Failure Is Not Fatal. [Here]. Date published: 14 August 2023.
  • Dead Man s PLC DM PLC . [Here]. Date published: 13 August 2023.
  • A Bluffer s Guide to Blockchain 100 Knowledge Snippets. [Here]. Date published: 13 August 2023.
  • Safe Primes M LeBlanc and Sophie Germain. [Here]. Date published: 12 August 2023.
  • Gender biases Practical Subjects and Computer Science at School. [Here]. Date published: 12 August 2023.
  • Small Leaks Billions of Dollars. [Here]. Date published: 11 August 2023.
  • As an AI and Predatory Journals The Sad State of Some Academic Publishing. [Here]. Date published: 11 August 2023.
  • The 100 Basic Rules of Cryptography and Secure Programming . [Here]. Date published: 10 August 2023.
  • Lesson 1 in Secure Architecture and Development Understanding Entropy. [Here]. Date published: 10 August 2023.
  • How Milk Sad Exploited Wallets Seed To Bitcoin ID Explained. [Here]. Date published: 10 August 2023.
  • When The Government Can t Even Protect and Encrypt Our Data What Chance The Rest . [Here]. Date published: 9 August 2023.
  • Meet New PQC Signature Contenders. [Here]. Date published: 9 August 2023.
  • A Novice Mistake Meet Milk Sad And The 32 bit Key. [Here]. Date published: 9 August 2023.
  • Towards Big Brother or a Storm in A Teacup Zoom and T Cs. [Here]. Date published: 8 August 2023.
  • ASecuritySite A Decade in Crypto. [Here]. Date published: 8 August 2023.
  • The Wacky World of JavaScript and npm Protecting The Software Supply Chain Not . [Here]. Date published: 7 August 2023.
  • Smash The Orbs . [Here]. Date published: 7 August 2023.
  • My Five Favouriate Least Favouriate Computer Programming Language. [Here]. Date published: 7 August 2023.
  • For Speed Go For 12 Kangaroos. [Here]. Date published: 7 August 2023.
  • Simply IBE Identity Based Encryption . [Here]. Date published: 6 August 2023.
  • Weak Cryptography Implementations Fiat Shamir Attacks On Modern Proofs. [Here]. Date published: 5 August 2023.
  • Look Beyond the Horizon Crypto FinTech Seminar 6 Oct 2023 . [Here]. Date published: 5 August 2023.
  • Removing PKI with Self certified Public Keys. [Here]. Date published: 4 August 2023.
  • Implicitly Certified Identity based Public keys Meet G nther s Method. [Here]. Date published: 4 August 2023.
  • Just Git and Smashing Windows. [Here]. Date published: 3 August 2023.
  • Dead Simple Signing Envelopes DSSE . [Here]. Date published: 3 August 2023.
  • Recovering A Message From Just A Signature. [Here]. Date published: 1 August 2023.
  • Open The Podbay Doors HAL Will Health Care Will Struggle To Adopt AI . [Here]. Date published: 1 August 2023.
  • Cryptography Fundamentals ElGamal Encryption and Signature. [Here]. Date published: 1 August 2023.
  • HMAC or Public Key Signing of JWTs . [Here]. Date published: 31 July 2023.
  • Apple The Three Trillion Dollar Company. [Here]. Date published: 31 July 2023.
  • Did You Buy A Ring Doorbell From 2015 to 2019 Then You Could Get Compensation . [Here]. Date published: 30 July 2023.
  • Cryptography Fundamentals Commutative Encryption. [Here]. Date published: 30 July 2023.
  • Can Privacy and Traceability Exist Together Tracing Keys and Jurisdiction. [Here]. Date published: 30 July 2023.
  • Bluffers Guide To JWTs. [Here]. Date published: 30 July 2023.
  • Byzantine Secret Share Resiliance No Need For a Dealer When A Participant Goes Bad. [Here]. Date published: 29 July 2023.
  • Abstraction Words and Detail Grayson Perry. [Here]. Date published: 29 July 2023.
  • A Soft Target Are Higher Education Infrastructures At Risk . [Here]. Date published: 29 July 2023.
  • Let s get back to innovating . [Here]. Date published: 27 July 2023.
  • Unveiling The Future of E governmen. [Here]. Date published: 26 July 2023.
  • Noyce Moore and Grove A Template for Spin out Start up Success . [Here]. Date published: 26 July 2023.
  • My Bluffer s Guide to Spin out Success. [Here]. Date published: 26 July 2023.
  • TETRA BURST. [Here]. Date published: 25 July 2023.
  • New Vulnerability for OpenSSH CVE 2023 38408. [Here]. Date published: 25 July 2023.
  • The Mighty Cloudflare Finding the people who do want to believe and be championed and stop over . [Here]. Date published: 24 July 2023.
  • The Fundamental Cloud Decisions . [Here]. Date published: 23 July 2023.
  • Cybersecurity Cloud Lesson 1 Rule Book in Key Management. [Here]. Date published: 23 July 2023.
  • Cryptography Fundamentals 8 RSA Rivest Shamir and Adleman. [Here]. Date published: 23 July 2023.
  • Cryptography Fundamentals 7 Quadratic residues Mod N. [Here]. Date published: 23 July 2023.
  • Passion Leadership and Responsibility. [Here]. Date published: 22 July 2023.
  • Losing The Keys To The Castle Azure Key Breach Should Worry Every Organisation. [Here]. Date published: 22 July 2023.
  • Cryptography Fundamentals 6 Chinese Remainder Theory CTR . [Here]. Date published: 22 July 2023.
  • Cryptography Fundamentals 5 GCD Extended GCD and Group Generators. [Here]. Date published: 22 July 2023.
  • Cryptography Fundamentals 4 Finite Fields aka Galious Fields . [Here]. Date published: 21 July 2023.
  • Yes Thank you You re right I have updated the article . [Here]. Date published: 20 July 2023.
  • Kevin Mitnick RI. [Here]. Date published: 20 July 2023.
  • Dreaming Thinking Communicating With Light. [Here]. Date published: 20 July 2023.
  • Cryptography Fundamentals 3 Elliptic Curve Fundamentals. [Here]. Date published: 20 July 2023.
  • Cryptography Fundamentals 2 Mapping Groups Adding Subtracting Multiplying Dividing and . [Here]. Date published: 20 July 2023.
  • Cryptography Fundamentals Part 1 Groups Rings and Discrete Log. [Here]. Date published: 19 July 2023.
  • In The Future ChatGPT Could Be The Cloud The Future of AI based Virtualisation. [Here]. Date published: 18 July 2023.
  • When A Typo Matters Send Sensitive Military Information to Mali. [Here]. Date published: 17 July 2023.
  • Does AI Lie . [Here]. Date published: 17 July 2023.
  • Yes Most hashed passwords are now salted so rainbow tables are not much use . [Here]. Date published: 16 July 2023.
  • Would You Take On A 1 Million Bet For The Cracking of Elliptic Curve Cryptography ECC By 2050 . [Here]. Date published: 16 July 2023.
  • AI Cyber Warfare and The Digital Battle Field. [Here]. Date published: 16 July 2023.
  • Why Is AES GCM Good and Not So Good for Cybersecurity . [Here]. Date published: 15 July 2023.
  • Spin outs Reinvestment and Universities. [Here]. Date published: 15 July 2023.
  • Tracking The Identity of Devices By Their Bluetooth Signal Footprint. [Here]. Date published: 14 July 2023.
  • That Pesky dBm . [Here]. Date published: 14 July 2023.
  • The Beauty and Power of Elliptic Curve Cryptography. [Here]. Date published: 13 July 2023.
  • My Bike and A Podcast We Take Our Digital World For Granted. [Here]. Date published: 13 July 2023.
  • How To Double Your Money with Python and AES CTR. [Here]. Date published: 12 July 2023.
  • How Do You Change Pounds Into Dollars within Encrypted Messages . [Here]. Date published: 12 July 2023.
  • Why is 128 bit AES Insecure for a Quantum Computer But 256 bit Is Not . [Here]. Date published: 11 July 2023.
  • GCM XTS and CCM Stream Ciphers. [Here]. Date published: 11 July 2023.
  • Steebog and Cybersecurity. [Here]. Date published: 9 July 2023.
  • Let s Ask Satoshi Three Questions Why Two Hashes Why RIPEMD160 and SHA 256 Why RIPEMD160 . [Here]. Date published: 9 July 2023.
  • Libre OpenSSL The OpenSSL Alternative. [Here]. Date published: 8 July 2023.
  • Eve The Magician Breaks AES Again . [Here]. Date published: 8 July 2023.
  • Can You Trust AES Encryption . [Here]. Date published: 8 July 2023.
  • A Bluffers Guide To Symmetric Key Encryption Mode. [Here]. Date published: 8 July 2023.
  • What s The Fastest Symmetric Cipher and Mode . [Here]. Date published: 7 July 2023.
  • UWS Cyber Breach. [Here]. Date published: 7 July 2023.
  • Two Sides of the Quantum Coin. [Here]. Date published: 7 July 2023.
  • How Many Things Can You Count To on Your Fingers . [Here]. Date published: 7 July 2023.
  • Homomorphic Multiplication and Division with RSA. [Here]. Date published: 7 July 2023.
  • Beware of Sandwich Attacks. [Here]. Date published: 7 July 2023.
  • Having X Ray Eyes In Cybersecurity Debugging with OpenSSL and ASN 1. [Here]. Date published: 6 July 2023.
  • Open Letter from Security and Privacy Researchers in relation to the Online Safety Bil. [Here]. Date published: 5 July 2023.
  • Everything You Ever Wanted To Know About Authenticated Encryption With Additional Data AEAD But . [Here]. Date published: 5 July 2023.
  • ASN 1 and DE. [Here]. Date published: 5 July 2023.
  • Those Tables Password Cracking Times That Scare You Are Mostly Wrong. [Here]. Date published: 4 July 2023.
  • scrypt The Memory Hard GPU Cruncher. [Here]. Date published: 4 July 2023.
  • Sweet are the uses of adversity. [Here]. Date published: 3 July 2023.
  • How The Mighty Have Fallen RC4 Fast Compact and Insecur. [Here]. Date published: 3 July 2023.
  • China and the SM Ciphers Here s SM4. [Here]. Date published: 3 July 2023.
  • Which Encryption Method Can Support a 448 bit Encryption Key and Its Derivative Nearly Became AES . [Here]. Date published: 2 July 2023.
  • Edinburgh This Magestic City The mix old and modern tradition and innovation was intoxicating . [Here]. Date published: 2 July 2023.
  • Could DES 3DES Please Leave the Stage Before The End of the Year if possible. [Here]. Date published: 2 July 2023.
  • CAST5. [Here]. Date published: 2 July 2023.
  • Camellia Where Horst Feistel Meets Rijndael AES . [Here]. Date published: 2 July 2023.
  • Moving Payments to the Cloud. [Here]. Date published: 1 July 2023.
  • In Innovation Success Is Often The Best Revenge. [Here]. Date published: 1 July 2023.
  • Physical Unclonable Functions PUFs . [Here]. Date published: 29 June 2023.
  • So What Modes Can You Have For Symmetric Key . [Here]. Date published: 28 June 2023.
  • Finding Your OpenSSH Private Keys. [Here]. Date published: 28 June 2023.
  • Doh Rust Takes Years To Learn . [Here]. Date published: 28 June 2023.
  • The Bluffers Guide to Discrete Logarithms And How They Protected and Changed Our World. [Here]. Date published: 27 June 2023.
  • Standing on the Horizon of One of the Greatest Advancements in Science The Quantum Computer. [Here]. Date published: 27 June 2023.
  • Machine Learning in Digital Forensic. [Here]. Date published: 26 June 2023.
  • Everything You Ever Wanted To Know About ECDSA But Were Afraid To Ask. [Here]. Date published: 26 June 2023.
  • SolarWinds What Happened And How Can We Stop It In The Future . [Here]. Date published: 25 June 2023.
  • So What Is Ed25519 and What Does It Have To Do With Curve 25519 . [Here]. Date published: 25 June 2023.
  • Everything You Ever Wanted To Know About RSA Signatures But Were Afraid To Ask. [Here]. Date published: 25 June 2023.
  • Jon Postel The Editor of the Internet. [Here]. Date published: 24 June 2023.
  • BRUTEPRINT Brute Forcing Fingerprint Authentication. [Here]. Date published: 24 June 2023.
  • 1 Detects a Prime Number. [Here]. Date published: 23 June 2023.
  • Your LEDs Could Be Leaking Your Encryption Keys . [Here]. Date published: 22 June 2023.
  • So What s So Important About Your OpenSSH Keys . [Here]. Date published: 22 June 2023.
  • DSA and OpenSSH It s Legacy But Still Great. [Here]. Date published: 22 June 2023.
  • What Files What A Hacker Look For In Order to Breach Trust. [Here]. Date published: 21 June 2023.
  • Tokenization and The Future of Money Improving the old Enabling the new. [Here]. Date published: 21 June 2023.
  • Your RSA Keys Are Likely To Be So Important For The Security of Your Organisation especially . [Here]. Date published: 20 June 2023.
  • Towards Zero Trust and Citizen Rights. [Here]. Date published: 19 June 2023.
  • They Killed Kenny Meet The Kenny Cipher. [Here]. Date published: 19 June 2023.
  • How Do Ratchets Protect Your Data . [Here]. Date published: 18 June 2023.
  • Having Fun With Ciphers Bitwise Rotations and the Rotate Cipher. [Here]. Date published: 18 June 2023.
  • Cloud Cyber Insurance Getting Good Lower Premiums For Good Practic. [Here]. Date published: 18 June 2023.
  • AI Aims For Perfect Coding And With Multiple Solutions. [Here]. Date published: 18 June 2023.
  • GPT 4 Is The Perfect Student Will Education As We Know It Come Crumbling Down . [Here]. Date published: 17 June 2023.
  • The NSA NIST and Crypto in Court. [Here]. Date published: 16 June 2023.
  • CTF Cracking a Faulty Signature. [Here]. Date published: 14 June 2023.
  • Cracking RSA With Only A Few Known Bits. [Here]. Date published: 13 June 2023.
  • Making Cybersecurity Fun. [Here]. Date published: 12 June 2023.
  • Why Doesn t Code Have a Pen Test When Compiling . [Here]. Date published: 11 June 2023.
  • Stop Confusing Cryptocurrency with Digital Currency The Move Towards 21st Century Finance. [Here]. Date published: 11 June 2023.
  • Paranoid Cryptography and the Return of the Coppersmith Attack ROCA . [Here]. Date published: 11 June 2023.
  • Paranoid Cryptography Pollard s p 1 method and Powersmooth. [Here]. Date published: 11 June 2023.
  • Paranoid Cryptography Factoring RSA keys from certified smart cards Coppersmith in the wild. [Here]. Date published: 11 June 2023.
  • Step by Step RSA Decryption using dQ dP and Qinv. [Here]. Date published: 10 June 2023.
  • Provable Secure Signatures with RSA. [Here]. Date published: 10 June 2023.
  • MOVEit and HR Systems Who Is Responsible For the Cybersecurity of our SAS . [Here]. Date published: 10 June 2023.
  • AI Detectors The Ethical Dilemma of Bias Towards Native English Speakers. [Here]. Date published: 10 June 2023.
  • RSA Boxer Of Our Online World. [Here]. Date published: 9 June 2023.
  • Reactable Signatures using A Naive Approach and The Johnson Merkle Method. [Here]. Date published: 8 June 2023.
  • Inspiring The Next Generation into Maths Coding and Cybersecurity and many other things . [Here]. Date published: 7 June 2023.
  • The MOVEit Zero Day and The Payroll Hack. [Here]. Date published: 6 June 2023.
  • For Security Go Hybrid Hybrid Public Key Encryption HPKE and RFC 9180. [Here]. Date published: 6 June 2023.
  • The UK Digital Pound. [Here]. Date published: 5 June 2023.
  • HMAC and HKDF. [Here]. Date published: 4 June 2023.
  • Crypt For Password. [Here]. Date published: 4 June 2023.
  • The Next Great Technology Frontier The Cybersecurity of Vehicles. [Here]. Date published: 3 June 2023.
  • Why Did NIST Pick Dilithium and FALCON . [Here]. Date published: 1 June 2023.
  • ElGamal Encryption with Elliptic Curve. [Here]. Date published: 29 May 2023.
  • Embedding Data In Point on a Graph The Beauty and Power Of Elliptic Curves. [Here]. Date published: 28 May 2023.
  • Proof of Shuffle Using Homomorphic Encryption and ElGamal Encryption . [Here]. Date published: 27 May 2023.
  • ElGamal Applying Multiple Public Key Operations ECC . [Here]. Date published: 27 May 2023.
  • The Most Important Area of Cybersecurity Perhaps Identity and Access Management . [Here]. Date published: 26 May 2023.
  • Slow And Steady Wins The Light weight Race Meet ASCON. [Here]. Date published: 25 May 2023.
  • What s So Special About 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 . [Here]. Date published: 22 May 2023.
  • M LeBlanc and Safe Primes. [Here]. Date published: 22 May 2023.
  • kth root of n mod p . [Here]. Date published: 22 May 2023.
  • Proving I Have the Private Key for a Given Public Key Without Giving It Away. [Here]. Date published: 21 May 2023.
  • Blum Integers. [Here]. Date published: 21 May 2023.
  • Proof of Square Free For Paillier. [Here]. Date published: 20 May 2023.
  • Cracking Wifi With Sleep Mode. [Here]. Date published: 20 May 2023.
  • The Buzz of Real World Crypto PQC Goes Into Production. [Here]. Date published: 18 May 2023.
  • Psalm 46 and Shakespeare. [Here]. Date published: 18 May 2023.
  • Cisco ASA Devices on the Naughty Step Again . [Here]. Date published: 18 May 2023.
  • Norman and Bad AI. [Here]. Date published: 17 May 2023.
  • Veracity The Most Important V in Big Data. [Here]. Date published: 16 May 2023.
  • Security By Design Meet Near Perfect Message Security Messaging Layer Security MLS . [Here]. Date published: 15 May 2023.
  • Ratcheting Trees and Building A Secure Messaging Platform. [Here]. Date published: 15 May 2023.
  • When The Web Was Command Lin. [Here]. Date published: 14 May 2023.
  • The Previous Experiments With AI Bots Didn t Go Well Here s Tay and Norman. [Here]. Date published: 14 May 2023.
  • How Private Is Your Browser . [Here]. Date published: 14 May 2023.
  • Meet Snake Perseus and Uroboros A Lesson In Cryptography. [Here]. Date published: 13 May 2023.
  • Full Homomorphic Encryption FHE and CSAM. [Here]. Date published: 13 May 2023.
  • Inform Debate and Listen and Engage . [Here]. Date published: 12 May 2023.
  • Lesson 1 in Secure Programming Don t Reuse Your IVs. [Here]. Date published: 9 May 2023.
  • Four Basic Rules of ECDSA Signatures . [Here]. Date published: 9 May 2023.
  • McEliece and Rust Edging Slowly To A NIST Standard for PQC. [Here]. Date published: 7 May 2023.
  • The Cybersecurity of ChatGPT. [Here]. Date published: 6 May 2023.
  • Building A New World of Security With Zero Trust Trusted Attributes and Claims. [Here]. Date published: 5 May 2023.
  • Thank Diophantus and Mordell For Your Online Security. [Here]. Date published: 4 May 2023.
  • Great Update but TL DR Don t Turn It On . [Here]. Date published: 4 May 2023.
  • Where You See Difficulty I See Opportunity . [Here]. Date published: 4 May 2023.
  • What Have Tweedledee and Tweedledum Got To Do With Cybersecurity . [Here]. Date published: 2 May 2023.
  • In a Post Quantum World We Need to Eliminate The State. [Here]. Date published: 30 April 2023.
  • Elliptic Curve Integrated Encryption Scheme ECIES Encrypting Using Elliptic Curve. [Here]. Date published: 30 April 2023.
  • Software Supply Chain Attacks The NCSC and the NCSC Concur That They Are A Major Risk in our World. [Here]. Date published: 29 April 2023.
  • From Zero To Hero With a Bit More Detail. [Here]. Date published: 29 April 2023.
  • Find Your Fire . [Here]. Date published: 29 April 2023.
  • Baby Kyber Part 2 Encryption and Decryption. [Here]. Date published: 25 April 2023.
  • Blue Ticks or A Proper Digital Identity System . [Here]. Date published: 24 April 2023.
  • Baby Kyber Part 1 Generating the Private and Public Keys. [Here]. Date published: 23 April 2023.
  • I Lattices. [Here]. Date published: 22 April 2023.
  • Code Whisperering and Coding For All The Days of CodeStack Are Numbered. [Here]. Date published: 16 April 2023.
  • Go Do Cloud The Perfect Digital Toolbox in Building The Future. [Here]. Date published: 15 April 2023.
  • In Cybersecurity There s No Magic Wand That The Good People Can Only Use. [Here]. Date published: 14 April 2023.
  • Well Done To WhatsApp In Taking Security Seriously Key Transparency. [Here]. Date published: 13 April 2023.
  • Yael Tauman Kalai Cryptographic Excellence. [Here]. Date published: 12 April 2023.
  • Having Your Crypto Handshaking Cake And Eating It X25519 or Kyber Why Not Have Both . [Here]. Date published: 11 April 2023.
  • Having Your Crypto Cake And Eating It Ed25519 or Dilithium Why Not Have Both . [Here]. Date published: 11 April 2023.
  • Energy Consumption of Post Quantum Cryptography Dilithium and Kyber Beat Our Existing TLS 1 3. [Here]. Date published: 11 April 2023.
  • How Many Work Roles in Cybersecurity Can you Name . [Here]. Date published: 10 April 2023.
  • Assessing Skill Levels of IT Auditors. [Here]. Date published: 10 April 2023.
  • 15 Minutes of Privacy. [Here]. Date published: 8 April 2023.
  • A Laser In Your Home To Infinity And Beyond MIMO 6G and Terahertz. [Here]. Date published: 5 April 2023.
  • The Wonderful World of Bob and Alice Martin Gardner ARS NSA Interference and Cracking Knapsack. [Here]. Date published: 2 April 2023.
  • Piger Fabrica Syndrome Major Vulnerability Could Bring Down The Internet. [Here]. Date published: 1 April 2023.
  • When 59 Bitcoins Just Vanished And When Sony Just Didn t Play Randomly. [Here]. Date published: 28 March 2023.
  • It Changed Our World As Few Things Have Done in the Whole History of Human Kind Ethernet. [Here]. Date published: 25 March 2023.
  • Gordon Moore RIP. [Here]. Date published: 25 March 2023.
  • GitHub Says Ooops . [Here]. Date published: 25 March 2023.
  • Route Summarization. [Here]. Date published: 24 March 2023.
  • Spotting Randomness. [Here]. Date published: 23 March 2023.
  • At The Core of Cybersecurity Is The Secret And The Great Protector is PBKDF2. [Here]. Date published: 21 March 2023.
  • Microsoft s Little Secret Encrypting Passwords and Keys. [Here]. Date published: 20 March 2023.
  • Cybersecurity Is Beautiful and Magical . [Here]. Date published: 18 March 2023.
  • Overcoming Dragonblood Hashing Data To An Elliptic Curve Point or Scalar In A Constant Time. [Here]. Date published: 15 March 2023.
  • For Improved Wifi Security It s Hello To DragonFly WPA3 . [Here]. Date published: 15 March 2023.
  • The People Who Got Me Into Cybersecurity and Cryptography Marty Hellman Neal Koblitz and Bruce . [Here]. Date published: 12 March 2023.
  • What Happens If I Don t Trust The Dealer in a Card Game A Bit of Mental Poker in . [Here]. Date published: 9 March 2023.
  • The real value is that we can use HTTPs for the communications and that the site can mainly be . [Here]. Date published: 5 March 2023.
  • Everything You Ever Wanted to Know About Digital Certificates But Were Afraid To Ask . [Here]. Date published: 4 March 2023.
  • The Cybersecurity of Headsets. [Here]. Date published: 3 March 2023.
  • Digital Signatures for the Future Dilithium FALCON and SPHINCS . [Here]. Date published: 2 March 2023.
  • Post Quantum and Non Post Quantum Key Exchange ECC and Kyber Working in Harmony. [Here]. Date published: 28 February 2023.
  • OSPF Open Shortest Path First . [Here]. Date published: 28 February 2023.
  • McEliece Key Exchange The Tortoise Shell Is A Little Broken But It Is Still Secure. [Here]. Date published: 27 February 2023.
  • Undetectable Backdoors in Machine Learning Models. [Here]. Date published: 25 February 2023.
  • Now Machines Attack Post Quantum Cryptography Kyber Has Been Cracked Not The Algorithm Though. [Here]. Date published: 25 February 2023.
  • Neal Koblitz He Built A Solid Foundation for Cybersecurity and Trust. [Here]. Date published: 25 February 2023.
  • ChatGPT Just Invented a New Encryption Method Aontacht. [Here]. Date published: 23 February 2023.
  • The Miracl e of Building a More Trusted and Private Digital World. [Here]. Date published: 22 February 2023.
  • Don t Trust GPT Off Topic and Wrong. [Here]. Date published: 21 February 2023.
  • The Two Most Interesting And Useful Academic Things I Have Learnt in my Academic Career DL and ECC. [Here]. Date published: 20 February 2023.
  • What Was Your Favourite Computer Over the Years . [Here]. Date published: 18 February 2023.
  • Tommy Flowers Quantum Computers and Colossu. [Here]. Date published: 18 February 2023.
  • Novice Cybersecurity Mistakes Why Must e Not Share A Factor with PHI . [Here]. Date published: 18 February 2023.
  • Why I Do Cybersecurity Because of One Book Secrets Lies. [Here]. Date published: 16 February 2023.
  • Encryption with ElGamal. [Here]. Date published: 16 February 2023.
  • Using Public Key Methods To Encrypt Data With GPG RSA is still the Leader. [Here]. Date published: 15 February 2023.
  • Nano Painting Encryption With Colours. [Here]. Date published: 15 February 2023.
  • Single Tenant or Multi Tenant HSMs Do You Trust Your Cloud Provider Not To Peek At Your Keys . [Here]. Date published: 14 February 2023.
  • Let s Hear It For The Legacy Ciphers CAST5 IDEA Blowfish and Twofish. [Here]. Date published: 14 February 2023.
  • GPG Signatures and Verification. [Here]. Date published: 14 February 2023.
  • There can never be true guarentees and we must trust the auditing facilities on FIP140 to at least . [Here]. Date published: 13 February 2023.
  • Privacy Integrity and Trust Some Day We Will Integrate These Into All Our Communications The . [Here]. Date published: 13 February 2023.
  • Pretty Good Privacy and Box. [Here]. Date published: 12 February 2023.
  • World leaders in Cryptography Jean Philippe JP Aumasson. [Here]. Date published: 11 February 2023.
  • Pesky C and Memory OpenSSL on the Naughty Step Again . [Here]. Date published: 9 February 2023.
  • What s Holding Your Back From Encrypting By Default Meet Envolope Encryption and the Cloud. [Here]. Date published: 7 February 2023.
  • ASCON is a Light weight Champion. [Here]. Date published: 7 February 2023.
  • You need to add it to your message . [Here]. Date published: 6 February 2023.
  • Digitial Sovereignty Hold Your Own Keys HY. [Here]. Date published: 6 February 2023.
  • Beware of an Ransomware Attack on ESXi Servers. [Here]. Date published: 6 February 2023.
  • Back on the Cybersecurity Demo Road . [Here]. Date published: 6 February 2023.
  • The Strange Tale of the Disappearing Salt Meet OpenSSL. [Here]. Date published: 5 February 2023.
  • Schnorr and Bernstein joins Rivest Johnson and Kravitz EdDSA Joins The Digital Signature Hall of . [Here]. Date published: 4 February 2023.
  • Say Hello To The EdDSA Standard and FIPS 186 5 And A Long Goodbye to DSA . [Here]. Date published: 2 February 2023.
  • RFC 9116 File Format to Aid in Security Vulnerability Disclosure. [Here]. Date published: 2 February 2023.
  • JSON and Encryption Keys. [Here]. Date published: 2 February 2023.
  • Microsoft The Mighty Code and Cloud Creator and the Mighty Cybersecurity Integrator Healthy or . [Here]. Date published: 1 February 2023.
  • Traffic Light Hacking. [Here]. Date published: 29 January 2023.
  • Polynomials and Mod p in Numpy. [Here]. Date published: 29 January 2023.
  • This idea was so outrageous . [Here]. Date published: 28 January 2023.
  • Cybersecurity Medieval Witchcraft Chimeras and The Hound of Hades. [Here]. Date published: 28 January 2023.
  • One of the Oldest Cloud Regions Gets A Boost . [Here]. Date published: 24 January 2023.
  • Cloudflare CIRCL and Blinded RSA Signatures. [Here]. Date published: 22 January 2023.
  • How Does Peggy Prove Her Identity Without Giving Away the Root of Her Identity . [Here]. Date published: 21 January 2023.
  • Schnorr Zero Knowledge Proofs With Elliptic Cr. [Here]. Date published: 20 January 2023.
  • IBM And The Paper That Built Our World of Data. [Here]. Date published: 19 January 2023.
  • To Scale To The Future Goodbye SQL . [Here]. Date published: 15 January 2023.
  • Is The Public Cloud Possibly Now More Secure and Resilience Than On Premise . [Here]. Date published: 15 January 2023.
  • Innovation Innovation Innovation. [Here]. Date published: 13 January 2023.
  • For Resilience Go Glacier. [Here]. Date published: 10 January 2023.
  • For a Post Quantum World Is It All About Lattice Methods No Meet SPHINCS BIKE and HQC. [Here]. Date published: 9 January 2023.
  • What s a Cipher Suite in TLS . [Here]. Date published: 8 January 2023.
  • The Answer Is Not 42 It s Zero Trust . [Here]. Date published: 7 January 2023.
  • Proving Things With Hats. [Here]. Date published: 6 January 2023.
  • Goodbye S3 Bucket Breaches And Hello To Encryption By Default. [Here]. Date published: 6 January 2023.
  • Can I Prove That I Have Used A Random Number Generator . [Here]. Date published: 6 January 2023.
  • Golang and the Arduino. [Here]. Date published: 5 January 2023.
  • Digital Trust The Magic of r and s. [Here]. Date published: 5 January 2023.
  • Protecting The Cybersecurity Crown Jewels. [Here]. Date published: 4 January 2023.
  • John Napier s Legacy DSA. [Here]. Date published: 4 January 2023.
  • Could RSA 2048 Be Cracked By 2025 . [Here]. Date published: 4 January 2023.
  • A Core Part of Cybersecurity Are Backups and Resilience. [Here]. Date published: 4 January 2023.
  • Which Software Took 12 Years To Reach Version 1 and Doesn t Have a Version 2. [Here]. Date published: 3 January 2023.
  • Signcryption Signing and Encrypting. [Here]. Date published: 3 January 2023.
  • My Top 10 Things To Learn in 2023. [Here]. Date published: 3 January 2023.
  • How To Avoid A Log Jam Diffie Hellman and OpenSS. [Here]. Date published: 3 January 2023.
  • Happy Birthday to Bitcoin. [Here]. Date published: 3 January 2023.
  • A Bluffers Guide To ECDSA and EdDSA. [Here]. Date published: 3 January 2023.
  • Only 51 Have Been Found Here s Mersenne Primes. [Here]. Date published: 2 January 2023.
  • Primitive and Conway Polynomials. [Here]. Date published: 1 January 2023.
  • Goodbye 2022 and Hello To 2023 From Virtual to Physical. [Here]. Date published: 1 January 2023.
  • The Rise and Fall of Sun and Apollo And for UUID Meet ULID. [Here]. Date published: 31 December 2022.
  • Why Is Symmetric Key Encryption So Much Faster Than Asymmetric Public Key . [Here]. Date published: 30 December 2022.
  • zk IMG Fighting Disinformation. [Here]. Date published: 28 December 2022.
  • So Which Is the Best Lightweight Encryption Hashing Method It s TinyJambu. [Here]. Date published: 28 December 2022.
  • Energy Drain and Hardware Requirements Which Is The Best Lightweight Cryptography Method from the . [Here]. Date published: 28 December 2022.
  • Which Will Become The Light weight Encryption Standard Will it be Sparkling or be an Elephant . [Here]. Date published: 27 December 2022.
  • Will Joan Daemon Win The NIST Standard For a Third Time Meet Xoodyak The Light Weight Cipher. [Here]. Date published: 26 December 2022.
  • Not How The Grinch Stole Christmas But How Galois Saved Cybersecurity. [Here]. Date published: 26 December 2022.
  • All Change in Block Ciphers A View From The Deck. [Here]. Date published: 26 December 2022.
  • Creating a Base Cipher. [Here]. Date published: 24 December 2022.
  • You Won t Find I in Bitcoin Here s Base 2 16 32 45 58 64 and all the other bases. [Here]. Date published: 23 December 2022.
  • Chameleon Hashes. [Here]. Date published: 22 December 2022.
  • Picking a Safe Generator For Discrete Log. [Here]. Date published: 21 December 2022.
  • Where Would You Find Elf in Cybersecurity . [Here]. Date published: 20 December 2022.
  • DNS The Greatest Flaw In The Internet . [Here]. Date published: 20 December 2022.
  • Malware Spear Phishing Detection Meet TLSH A Locality Sensitive Hash. [Here]. Date published: 18 December 2022.
  • Spotting Spam with Similarity Hashes. [Here]. Date published: 17 December 2022.
  • Similarity Hashing and Perceptual Hashes. [Here]. Date published: 17 December 2022.
  • Malware Detection Context Triggered Piecewise Hashes CTPH . [Here]. Date published: 17 December 2022.
  • Hyperloglog A Simple Estimation of The Number of Unique Elements in a Large Data Set. [Here]. Date published: 17 December 2022.
  • Publishing in a Cybersecurity Cryptography Conference Which Are Best Here s AR PR and CR. [Here]. Date published: 16 December 2022.
  • A Few Years To Finally Say Goodbye To SHA 1. [Here]. Date published: 16 December 2022.
  • Can We Generate a Secret Based on Bob and Alice s Secret And Prove It . [Here]. Date published: 14 December 2022.
  • Thank Euclid For Your Online Security . [Here]. Date published: 12 December 2022.
  • The Day I Got Public Encryption Encryption Here s The Mod Root. [Here]. Date published: 11 December 2022.
  • And So Shamir Cracked Merkle s Knapsack But Along Came Naccache and Stern and it s uncracked . [Here]. Date published: 11 December 2022.
  • The Bluffers Guide to secp256k1 When Satoshi Said Goodbye To PKI. [Here]. Date published: 10 December 2022.
  • How Do I Create a Christmas Present For You That You Can t Open Before Christmas Day . [Here]. Date published: 9 December 2022.
  • A Christmas Cipher Test. [Here]. Date published: 9 December 2022.
  • The Future of Integrated Digital Governance in the EU EBSI and GLASS. [Here]. Date published: 7 December 2022.
  • Creating a Crypto Chat Bot. [Here]. Date published: 5 December 2022.
  • Proof of History Is It a Verifiable Delay Function . [Here]. Date published: 4 December 2022.
  • And The End Game Is Serverless Scripts Meet Lambda. [Here]. Date published: 4 December 2022.
  • The Mighty Jan Cryptographic Genius . [Here]. Date published: 3 December 2022.
  • Signing in the Cloud KMS RSA and OpenSSL. [Here]. Date published: 3 December 2022.
  • Some Companies Are Still Storing Passwords With MD5 and Unsalted . [Here]. Date published: 2 December 2022.
  • Envelope Encryption Storing Secrets in the Cloud. [Here]. Date published: 29 November 2022.
  • There would be an authenticated access to the Cloud such as though digital signing . [Here]. Date published: 28 November 2022.
  • Stop Hardcoding Your Secrets How To Securely Keep A Secret. [Here]. Date published: 28 November 2022.
  • HMAC in the Cloud. [Here]. Date published: 28 November 2022.
  • Which FIPS 140 Level Does Your Company Match To . [Here]. Date published: 27 November 2022.
  • Symmetric Key Encryption in the Cloud. [Here]. Date published: 27 November 2022.
  • Questions About Encryption Keys and the Cloud. [Here]. Date published: 27 November 2022.
  • Public Key Encryption in the Cloud. [Here]. Date published: 27 November 2022.
  • Digital Signing in the Cloud. [Here]. Date published: 27 November 2022.
  • OpenSSL Nearly Ripped The Internet Apart So Meet Google Tin. [Here]. Date published: 26 November 2022.
  • Key Rotation in the Cloud. [Here]. Date published: 26 November 2022.
  • GLASS and The Future. [Here]. Date published: 26 November 2022.
  • Watch out for the Twitter Bots They Want to Steal Your Cryptocurrency. [Here]. Date published: 23 November 2022.
  • Your Car Could Be A Cybersecurity Target Limp home Mode. [Here]. Date published: 20 November 2022.
  • The Mordell Curve. [Here]. Date published: 20 November 2022.
  • Enterprise and Innovation in Cryptograph. [Here]. Date published: 19 November 2022.
  • Teaching Cybersecurity and Machine Learnin. [Here]. Date published: 18 November 2022.
  • So What s A Modulus In Post Quantum Cryptography . [Here]. Date published: 15 November 2022.
  • Towards A More Private Data World Adding and Subtraction with Homomorphic Encryption. [Here]. Date published: 14 November 2022.
  • The Collapse of FTX Is Not The Fault of Cryptocurrency But Bad Business Models. [Here]. Date published: 13 November 2022.
  • The Beauty of the ElGamal Method A Sage Implementation. [Here]. Date published: 12 November 2022.
  • Sage and Elliptic Curves P256 and secp256k1. [Here]. Date published: 7 November 2022.
  • Sage Galois field and Irreducible Polynomials. [Here]. Date published: 6 November 2022.
  • Encryption On Surfaces Meet DASA. [Here]. Date published: 5 November 2022.
  • Punycode X 509 and OpenSSL SpookySSL. [Here]. Date published: 1 November 2022.
  • HC 256 A Fast and Secure Software Stream Cipher. [Here]. Date published: 31 October 2022.
  • Smashing Crypto Pumpkin. [Here]. Date published: 30 October 2022.
  • Liz Truss Signal and Snowden. [Here]. Date published: 30 October 2022.
  • Our PhD Graduates and A Talk with Taher ElGamal. [Here]. Date published: 27 October 2022.
  • Buying A Ticket With Privacy using the ElGamal Method. [Here]. Date published: 24 October 2022.
  • Commutative Encryption using a Modified ElGamal Method. [Here]. Date published: 23 October 2022.
  • Bob Investigates Wendy and Needs to Ask Alice. [Here]. Date published: 23 October 2022.
  • Beware of Flying Dones Here s Wi Peep. [Here]. Date published: 23 October 2022.
  • What s That It s a Blockchain . [Here]. Date published: 22 October 2022.
  • So What s a Yellow Paper. [Here]. Date published: 22 October 2022.
  • Homomorphic Hashing Is It Possible . [Here]. Date published: 22 October 2022.
  • He Basically Secured The Internet Peter Montgomery RIP. [Here]. Date published: 19 October 2022.
  • For Security in a Post Quantum World And In Being A Great Teacher We Thank Robert J McEliece RIP. [Here]. Date published: 19 October 2022.
  • Homomorphic Encryption With ElGamal Multiply Divide. [Here]. Date published: 18 October 2022.
  • Shafrira Goldwasser. [Here]. Date published: 16 October 2022.
  • Cryptography In The Family Blum Blum and Blum. [Here]. Date published: 16 October 2022.
  • Beware of The Rogue Public Key. [Here]. Date published: 16 October 2022.
  • Mathematics in the Blood The Lenstra Family. [Here]. Date published: 15 October 2022.
  • Wet Signatures In PDFs are Just Silly . [Here]. Date published: 13 October 2022.
  • What s Your Favouriate Algorithm . [Here]. Date published: 10 October 2022.
  • The EU Moves on the Cryptocurrency Regulation Bi. [Here]. Date published: 10 October 2022.
  • What s Next After Lattice Cryptography Will it be BIKE HQC or McEliece . [Here]. Date published: 8 October 2022.
  • Digital Citizen Interaction with Health Care . [Here]. Date published: 8 October 2022.
  • Ten Years Is A Long Time In Computing And Towards Using The Public Cloud As a Platform to Teach. [Here]. Date published: 5 October 2022.
  • Go Read a Research Paper. [Here]. Date published: 2 October 2022.
  • Base64 is Malleable . [Here]. Date published: 2 October 2022.
  • Your Hands Could Provide The Future For Payments. [Here]. Date published: 1 October 2022.
  • It s Alive Lattice Cryptography Takes Off To A New Level. [Here]. Date published: 28 September 2022.
  • The Times They Are A Changing Post Quantum Cryptography Brings Rings and Fully Homomorphic . [Here]. Date published: 26 September 2022.
  • A Long Goodbye to C and C And Hello To A Rusty Future. [Here]. Date published: 24 September 2022.
  • The Magic of Cryptographic Identifiers and Formats OIDs DER and ASN 1. [Here]. Date published: 21 September 2022.
  • Your Online Security Is Critically Dependent on the Generation of Random Prime Numbers. [Here]. Date published: 20 September 2022.
  • How Long Does It Take To Find a Random Prime Number. [Here]. Date published: 20 September 2022.
  • The Browser That Powers Apps Meet Electron. [Here]. Date published: 19 September 2022.
  • Let s Talk About Keysizes in RSA. [Here]. Date published: 19 September 2022.
  • Can You Solve This Big Integer Problem . [Here]. Date published: 19 September 2022.
  • For Your Online Security Thank Miller and Rabin. [Here]. Date published: 18 September 2022.
  • Did You Know That The Teams App Is Just A Browser . [Here]. Date published: 18 September 2022.
  • Your Online Security is Fundamentally Dependent on Hard Problems . [Here]. Date published: 16 September 2022.
  • Random Numbers Matter Ode to LFSR And The Future. [Here]. Date published: 14 September 2022.
  • RAMus Cryptographically Secure Memory. [Here]. Date published: 13 September 2022.
  • Closing the Gap between Sender Anonymity and Abuse Mitigation. [Here]. Date published: 13 September 2022.
  • Dr Who and The Happy Prime Numbers. [Here]. Date published: 12 September 2022.
  • Implementing Homomorphic Addition With ElGamal and PowerShell. [Here]. Date published: 11 September 2022.
  • Homomorphic Multiplication and Division Using ElGamal in PowerShell. [Here]. Date published: 11 September 2022.
  • ElGamal Big Integers And PowerShell. [Here]. Date published: 10 September 2022.
  • The First Rule of Cryptography You Don t Talk About Zero. [Here]. Date published: 4 September 2022.
  • So What s So Special About 10 10 1 . [Here]. Date published: 4 September 2022.
  • Smart Wallet Vulnerability using The Rogue Public Key Attack. [Here]. Date published: 3 September 2022.
  • To The Builders of our Future Meet The Chaum Pedersen Non Interactive Zero Knowledge Proof Method. [Here]. Date published: 1 September 2022.
  • Discrete Log Implementation of Schnorr Signatures in PowerShell. [Here]. Date published: 30 August 2022.
  • Ode To John Napier The NSA and FIPS 186 Meet DSA The Original Builder of Digital Trust. [Here]. Date published: 29 August 2022.
  • Did You Know An Electrical Vehicle Can Be Hacked Through A Charging Session . [Here]. Date published: 29 August 2022.
  • A Tale of Two Patents Kravitz v Schnorr. [Here]. Date published: 29 August 2022.
  • From Castle And Moat To Zero Trust Towards a SASE future. [Here]. Date published: 28 August 2022.
  • For Cybersecurity Knowledge and Skills Should You Go Long and Shallow Or Narrow and Deep . [Here]. Date published: 27 August 2022.
  • Breaking and Unbreaking in Cybersecurity RSA Solver for Two Different Public Key Exponents. [Here]. Date published: 27 August 2022.
  • In Our Existing Public Key Encryption We Use Prime Numbers To Reduce Complexity. [Here]. Date published: 26 August 2022.
  • CTF Generator RSA Cracking With the Different Public Exponents But The Same Modulus. [Here]. Date published: 26 August 2022.
  • Crypto Groundhog Day The Bleichenbacher Attack. [Here]. Date published: 25 August 2022.
  • RSA Step by Step. [Here]. Date published: 22 August 2022.
  • Cracking Rick Astley Nev1r G0nna G2ve Y8u Up N5v1r G1nna Let Y4u D1wn N8v4r G5nna D0sert You. [Here]. Date published: 22 August 2022.
  • How To Pad Data in RSA Meet PCKS 1 v1 5. [Here]. Date published: 21 August 2022.
  • The Rise and Rise of Homomorphic Encryption. [Here]. Date published: 20 August 2022.
  • Say Goodbye to Miners and Hello to Builders Proposers and Verifiers Sharding and Danksharding. [Here]. Date published: 19 August 2022.
  • Thank Fermat For Your Online Security. [Here]. Date published: 18 August 2022.
  • Google And Cloudflare Are Changing The Trust Infrastructure of the Internet A Long Goodbye to RSA . [Here]. Date published: 18 August 2022.
  • Where Would You Find Both ECC and RSA Working Well Together . [Here]. Date published: 17 August 2022.
  • RSA Is Alive And Kicking in Nearly Every TLS Connection Creating Fast RSA Signatures. [Here]. Date published: 16 August 2022.
  • Beware of RSA Fault Attacks They May Comprise Your Trust Infrastructure. [Here]. Date published: 16 August 2022.
  • So What Are dQ dP and InvQ Used For In RSA . [Here]. Date published: 15 August 2022.
  • Homomorphic Encryption with ElGamal Using Python Multiplication and Division. [Here]. Date published: 15 August 2022.
  • Does ElGamal Encryption Do A Homomorphic Addition . [Here]. Date published: 15 August 2022.
  • Our Paper based World of Secrets. [Here]. Date published: 14 August 2022.
  • Crypto Magic Recovering Alice s Public Key From An ECDSA Signature. [Here]. Date published: 14 August 2022.
  • Satoshi Selected ECDSA with The Secp256k1 Curve and SHA 256 Are Other Options Available . [Here]. Date published: 13 August 2022.
  • The State of TLS ECDSA Nonce Reuse. [Here]. Date published: 12 August 2022.
  • Getting Rid of TLS 1 2 The Weaknesses of PKCS v1 5 and The Fault Attack. [Here]. Date published: 12 August 2022.
  • ECDSA Signatures Can Be Cracked With One Good Signature and One Bad One. [Here]. Date published: 12 August 2022.
  • For The Love of Random Numbers And A Bit of PowerShell Randomization. [Here]. Date published: 10 August 2022.
  • The Proper Way To Hash A Password Or Derive a Key From a Password Meet PBKDF2. [Here]. Date published: 9 August 2022.
  • RSA Weaknesses Powersmooth and Pollard s p 1 Method. [Here]. Date published: 8 August 2022.
  • Does Microsoft Powershell Do ECDSA . [Here]. Date published: 8 August 2022.
  • RSA Continued Fractions The Wiener Attack. [Here]. Date published: 7 August 2022.
  • Paranoid Cryptography ROCA. [Here]. Date published: 7 August 2022.
  • The Rise of the Smart Hoover A Helper or A. [Here]. Date published: 6 August 2022.
  • Paranoid Cryptography Fermat s Theorem For Cracking RSA. [Here]. Date published: 6 August 2022.
  • Slack on Security Posting Your Hashed Password To Others. [Here]. Date published: 5 August 2022.
  • Into A Hybrid PQC Post Quantum Cryptography World And Getting Ready For Full PQC. [Here]. Date published: 5 August 2022.
  • Experimenting with Post Quantum Cryptography The Greatest Change in the Internet Has Started . [Here]. Date published: 5 August 2022.
  • Building A More Trusted Web Meet Cloudflare SXG Automatic Signed eXchanGes . [Here]. Date published: 4 August 2022.
  • In Cybersecurity It s All About Threats Vulnerabilities Mitigations Detection and Risks. [Here]. Date published: 3 August 2022.
  • Hidden Pixels Click IDs and Other Tricks Is The Internet Just One Big Spying Network . [Here]. Date published: 3 August 2022.
  • How Do I Implement Symmetric Key Encryption In Ethereum . [Here]. Date published: 2 August 2022.
  • Cybersecurity Hard Soft Skills MSc or Degree Specialist or Generalist . [Here]. Date published: 1 August 2022.
  • And So Satoshi Selected secp256k1 for Bitcoin But There Are Better Curves for Smart Contracts. [Here]. Date published: 1 August 2022.
  • The Castryck Decru Attack on SIDH. [Here]. Date published: 31 July 2022.
  • So What Are RSA PCKS 1 5 RSA OAEP and RSA PSS And Why Is It Important To Pick The Right One . [Here]. Date published: 30 July 2022.
  • Why Sign JSON Web Tokens From A Password When We Can Use RSA or ECDSA. [Here]. Date published: 29 July 2022.
  • What s One of the Most Important Things in Cybersecurity But Is Possibly The Least Understood By . [Here]. Date published: 29 July 2022.
  • Towards The Tokenization of Data. [Here]. Date published: 29 July 2022.
  • In Cybersecurity What Are OIDs PEMs DERs and ASN 1. [Here]. Date published: 28 July 2022.
  • JavaScript RSA and ECDSA Signatures. [Here]. Date published: 27 July 2022.
  • Which Is One of The Most Wasteful Energy Industries in The World Software . [Here]. Date published: 24 July 2022.
  • Do You Know Your Keccak From Your SHA 3 And Your SHAKE From Your KMAC. [Here]. Date published: 23 July 2022.
  • What Is Domain Separation In Hashing Meet cSHAKE. [Here]. Date published: 22 July 2022.
  • Hellman Pedersen and Chaum ZKPs with the Decisional Diffie Hellman DDH assumption. [Here]. Date published: 21 July 2022.
  • Is the Cloud Resilient to Hot Days . [Here]. Date published: 20 July 2022.
  • Apple Innovation and Steve s Museum. [Here]. Date published: 20 July 2022.
  • NI ZKP using Discrete Log Equality DLEQ with secp256k1 P 256 Curve 25519 and Curve 448. [Here]. Date published: 19 July 2022.
  • John Napier Legacy Lives on With Privacy and Cybersecurity Meet NI ZKPs with Discrete Logs. [Here]. Date published: 19 July 2022.
  • Calling Smart Contracts From Python. [Here]. Date published: 18 July 2022.
  • The Great Story Teller Byzantine Armies Part Time Parliaments And Spending More Time Thinking. [Here]. Date published: 17 July 2022.
  • Encryption Keys In The Cloud. [Here]. Date published: 16 July 2022.
  • Talking About Jobs in The Tech Industry or in The Cybersecurity Industry Is Just Sill. [Here]. Date published: 15 July 2022.
  • Fun Facts With Encryption Keys What Takes 183 587 Million Million Million Million Million Million . [Here]. Date published: 15 July 2022.
  • Scotland s Enterprising and Innovative Tech Future. [Here]. Date published: 14 July 2022.
  • Reducing Costs and Saving The Planet Meet Serverless Technology. [Here]. Date published: 14 July 2022.
  • Cracking MEGA in Six Queries. [Here]. Date published: 14 July 2022.
  • The Toolkit For Building The Future . [Here]. Date published: 13 July 2022.
  • Assessing The PQC Also rans SIKE BIKE and Classic McEliece. [Here]. Date published: 12 July 2022.
  • A Long Goodbye To ECC and RSA and Hello to Falcon. [Here]. Date published: 12 July 2022.
  • Prove Your Know The Answer To A Maths Problem Without Giving The Answer. [Here]. Date published: 11 July 2022.
  • The Magic of zkSnarks From Equation to Verificatio. [Here]. Date published: 10 July 2022.
  • From Lamport and Merkle to a Post Quantum World Meet SPHINCS . [Here]. Date published: 10 July 2022.
  • Meet The Standard of the Future SPHINCS . [Here]. Date published: 9 July 2022.
  • Explaining BLS12 381 The Zero Knowledge Proof Curve. [Here]. Date published: 9 July 2022.
  • Damg rd Jurik Homomorphic Encryption With Secret Shares. [Here]. Date published: 8 July 2022.
  • How Does Peggy Prove To Victor The Banker That Her Salary is between 30K and 100K Without. [Here]. Date published: 7 July 2022.
  • Your Computer Monitor Could Be Leaking Sound Information . [Here]. Date published: 6 July 2022.
  • Proving You Have a Positive Value Without Revealing It. [Here]. Date published: 6 July 2022.
  • Fixing Wi fi Meet Dragonfly and a bit of ECC. [Here]. Date published: 6 July 2022.
  • Day 0 of a Post Quantum Cryptography World. [Here]. Date published: 5 July 2022.
  • Bob and Alice Become Socialists. [Here]. Date published: 5 July 2022.
  • NIZK Non interactive Zero Knowledge Proofs of Discrete log Equality. [Here]. Date published: 4 July 2022.
  • Proof of Concept of the Chalkias Ed25519 Implementation Vulnerability in Python. [Here]. Date published: 3 July 2022.
  • In Research Do what interests you the most and Stay curious . [Here]. Date published: 3 July 2022.
  • Day 0 for the Building of a New World of Trust. [Here]. Date published: 3 July 2022.
  • Explaining The Chalkias Ed25519 Vulnerability. [Here]. Date published: 2 July 2022.
  • Meet Frodo And The Magic of the Post Quantum Ring. [Here]. Date published: 1 July 2022.
  • Ed25519 is Great But. [Here]. Date published: 1 July 2022.
  • National Software Reference Library NSRL The NIST Standards for a Reference Data Set. [Here]. Date published: 30 June 2022.
  • To Patch or Not To Patch That is the Question . [Here]. Date published: 29 June 2022.
  • Please can you get in contact . [Here]. Date published: 29 June 2022.
  • A Bit of RSA and PowerShell And The Wonder of dP dQ and InvQ. [Here]. Date published: 27 June 2022.
  • Which Type of Encryption is Used for Protecting Passwords and Other Secrets in Windows . [Here]. Date published: 26 June 2022.
  • AES Encryption With PowerShell. [Here]. Date published: 26 June 2022.
  • If it wasn t for Email . [Here]. Date published: 25 June 2022.
  • The Grand Vision of The Future European Digital ID Wallet EDIW. [Here]. Date published: 24 June 2022.
  • On Passwordless Day . [Here]. Date published: 24 June 2022.
  • eIDAS and e ID and Building a More Trusted World. [Here]. Date published: 24 June 2022.
  • Breaking The Unbreakable Meet Malleable Encryption Goes Awry. [Here]. Date published: 22 June 2022.
  • Our Brittle Internet. [Here]. Date published: 21 June 2022.
  • The Barbie Cipher. [Here]. Date published: 19 June 2022.
  • Botnets are Go. [Here]. Date published: 19 June 2022.
  • EBSI The Grand Data Vision Building Bridges and Not Walls. [Here]. Date published: 18 June 2022.
  • Bad Crypto. [Here]. Date published: 18 June 2022.
  • Meet a New Cybersecurity Threat Frequency Scaling. [Here]. Date published: 16 June 2022.
  • The FIDO2 and Post Quantum Cryptography Revolution and HE ZKP and MPC. [Here]. Date published: 14 June 2022.
  • Finally An Identity Framework For The Public Sector To Build On. [Here]. Date published: 14 June 2022.
  • Your Computer Could Be Listening To Your Microphone and Sending Out Ultrasound . [Here]. Date published: 13 June 2022.
  • So What s Your Real Name . [Here]. Date published: 13 June 2022.
  • A Little Bit of Salt Helps Trustworthiness Meet NaCl. [Here]. Date published: 12 June 2022.
  • ROR13 And Its Linkage to API Calls within Modules. [Here]. Date published: 11 June 2022.
  • JP djb SipHash. [Here]. Date published: 11 June 2022.
  • Hello Dave Meet The First Fileless Malware. [Here]. Date published: 11 June 2022.
  • Goodbye Passwords Finally Here s To The Future With Passkeys and Privacy Pass. [Here]. Date published: 10 June 2022.
  • Goodbye and Good Riddens To CAPTCHA and Hello To Tokenizati. [Here]. Date published: 10 June 2022.
  • CTF Generator Low private exponent d in RSA the Wiener attack. [Here]. Date published: 6 June 2022.
  • How To Crack The Near Impossible When There s a Weakness Meet Fermat s Attack on RSA. [Here]. Date published: 5 June 2022.
  • Cracking RSA Ciphers That Have A Low exponen. [Here]. Date published: 5 June 2022.
  • RSA Capture The Flag For Chinese Remainder Thereom Meet H stad s Broadcast Attack. [Here]. Date published: 4 June 2022.
  • Disenrollment of Parties in Secret Shares. [Here]. Date published: 3 June 2022.
  • Shamir Secret Shares and Lagrange Interpretation Constants. [Here]. Date published: 2 June 2022.
  • Towards The Future . [Here]. Date published: 1 June 2022.
  • From crypt To GPU Breakers thank Morris . [Here]. Date published: 29 May 2022.
  • When Public Key and Symmetric Key Work Together Perfectly. [Here]. Date published: 28 May 2022.
  • Going Native With Coding. [Here]. Date published: 24 May 2022.
  • For The Love of Digital Forensics Where Would You Find 1111 1111 1111 and ID3 . [Here]. Date published: 22 May 2022.
  • For The Love of Digital Forensics Elf Katz and Zbikowski. [Here]. Date published: 22 May 2022.
  • What s Magic In Cybersecurity . [Here]. Date published: 21 May 2022.
  • Peer Review Flawed But What s Better . [Here]. Date published: 18 May 2022.
  • The LUNA and TerraUSD Crash. [Here]. Date published: 17 May 2022.
  • A Simple Bet On Prime Numbers. [Here]. Date published: 17 May 2022.
  • Proving I Know Alice Bob Carol and Dave. [Here]. Date published: 15 May 2022.
  • One Of The Greatest Protocols and One of The Greatest Weaknesses of the Internet Meet The . [Here]. Date published: 14 May 2022.
  • Ode To The IEEE Protocols Here s 802 1Q and 802 1X. [Here]. Date published: 14 May 2022.
  • Voice Video and Qo. [Here]. Date published: 13 May 2022.
  • Our Research Impac. [Here]. Date published: 12 May 2022.
  • The Device That Built The Interne. [Here]. Date published: 11 May 2022.
  • Ode To Network Switches. [Here]. Date published: 11 May 2022.
  • Go Learn Cisco . [Here]. Date published: 10 May 2022.
  • Dig Out Your Patents And Watch What You Use 1 1 billion for a Patent Breach. [Here]. Date published: 9 May 2022.
  • The First Lesson In Cybersecurity Binary Hex and Base64. [Here]. Date published: 8 May 2022.
  • Rick Astley and Ciphers. [Here]. Date published: 8 May 2022.
  • Cybersecurity Debasing. [Here]. Date published: 8 May 2022.
  • Blinding ECDSA. [Here]. Date published: 8 May 2022.
  • Go Read A Paper Part 1. [Here]. Date published: 7 May 2022.
  • Voting But Private. [Here]. Date published: 6 May 2022.
  • The Crazy World of Passwords To or to . [Here]. Date published: 3 May 2022.
  • In AES For The Same Plaintext Will We Always Get Same Ciphertext for the same IV and Key . [Here]. Date published: 2 May 2022.
  • From Garbled Circuits to Millionare Problems Meet Andrew Chi Chih Yao. [Here]. Date published: 2 May 2022.
  • Hiding Encryption and Credit Card numbers In Plaintext With Format Preserving Encryption. [Here]. Date published: 1 May 2022.
  • What s the Ed in Ed25519 . [Here]. Date published: 30 April 2022.
  • Goodbye to Elliptic Curves Not Quite Here Come Isogenies. [Here]. Date published: 30 April 2022.
  • This idea was so outrageous . [Here]. Date published: 29 April 2022.
  • Ransomware and Rust. [Here]. Date published: 26 April 2022.
  • For Digital Signatures It s Lattice or Picnics . [Here]. Date published: 26 April 2022.
  • ECC Trivia There Are Two Elliptic Curve Points For Every x Axis Point. [Here]. Date published: 25 April 2022.
  • Elliptic Curve Operations Within a Solidity Contract. [Here]. Date published: 24 April 2022.
  • In Cybersecurity The Song Remains The Same But With Ransomware Added . [Here]. Date published: 23 April 2022.
  • The Magic of Schnorr and Fiat Shamir Meet NI ZKPs. [Here]. Date published: 22 April 2022.
  • In A Privacy aware World Merlin Is Cool. [Here]. Date published: 22 April 2022.
  • Winding Back The Clock on Twitter. [Here]. Date published: 21 April 2022.
  • What Makes Elliptic Curve Cryptography So Good Montgomery s Ladder. [Here]. Date published: 21 April 2022.
  • The Wonder of Stack Overflo. [Here]. Date published: 21 April 2022.
  • Proving a Number Is In A Given Range Without Revealing The Number Meet Bulletproofs. [Here]. Date published: 21 April 2022.
  • Ode To Java And The Point At Infinity. [Here]. Date published: 21 April 2022.
  • Old With New ElGamal and Elliptic Curve Cryptography. [Here]. Date published: 20 April 2022.
  • Java s Weak Cybersecurity Track Record Continues This Time It s A Breach of Trust. [Here]. Date published: 20 April 2022.
  • Polynomials Will Secure The Internet . [Here]. Date published: 19 April 2022.
  • A Bluffer s Guide To AES Modes ECB CBC CFB and all that jazz . [Here]. Date published: 19 April 2022.
  • So How Does Padding Work in RSA . [Here]. Date published: 18 April 2022.
  • If one is master of one thing and understands one thing well one has at the same time insight . [Here]. Date published: 18 April 2022.
  • Symmetric Key Encryption With PBKDF2 and Node js . [Here]. Date published: 17 April 2022.
  • 02 03 or 04 So What Are Compressed and Uncompressed Public Keys . [Here]. Date published: 16 April 2022.
  • The Basics of Ethereum Keys IDs and Signatures. [Here]. Date published: 15 April 2022.
  • Proof That I Know Something Proving I Know x for Hash x . [Here]. Date published: 14 April 2022.
  • Semaphores IPFS and Smart Contract. [Here]. Date published: 13 April 2022.
  • Building For a Distributed and Resilient Future Here s Pigpen IPFS and Ethereum. [Here]. Date published: 13 April 2022.
  • Sometimes You Need A Hard Hat for Blockchain Testing. [Here]. Date published: 12 April 2022.
  • From The 18th Century to the 21st Century Morse Code To Ethereum. [Here]. Date published: 12 April 2022.
  • Deploying a Scrambled Alphabet Generator To Ethereum With Ganache and Ropsten . [Here]. Date published: 12 April 2022.
  • Proof of Stake Goes Live On Ethereum. [Here]. Date published: 11 April 2022.
  • Creating A Scrambled Alphabet Challenge Generator In Ethereum and Solidity. [Here]. Date published: 11 April 2022.
  • Dealing With Decimals In Smart Contracts. [Here]. Date published: 10 April 2022.
  • A Bluffers Guide to Ethereum Some Answers to Questions Go Learn More. [Here]. Date published: 10 April 2022.
  • So Goodbye To Our Old Ecomomy And Hello To The Tokenized Econom. [Here]. Date published: 9 April 2022.
  • Let s Do Some Zeppelin and Some Ganache and Truffles . [Here]. Date published: 7 April 2022.
  • A Caeser Cipher Quiz Gefrom a Smart Contract. [Here]. Date published: 6 April 2022.
  • Creating and Debugging Your Own Blockchain. [Here]. Date published: 3 April 2022.
  • The state of the smart contract will change . [Here]. Date published: 2 April 2022.
  • In Cybersecurity Watch What You Say . [Here]. Date published: 2 April 2022.
  • Good Riddance to Proof of Work . [Here]. Date published: 2 April 2022.
  • Deleting Data From A Smart Contract. [Here]. Date published: 2 April 2022.
  • Major Vulnerability May Bring Down Public Key Encryption. [Here]. Date published: 1 April 2022.
  • Well It s Spring and Here s Spring4Shell. [Here]. Date published: 31 March 2022.
  • Storing State in a Smart Contract. [Here]. Date published: 31 March 2022.
  • Let s Tokenize Health Care . [Here]. Date published: 29 March 2022.
  • Towards Zero Trust Meet The YubiKey. [Here]. Date published: 28 March 2022.
  • Creating Your Own Crypto Tokens. [Here]. Date published: 28 March 2022.
  • Using YubiKey to Protect Email With MFA. [Here]. Date published: 27 March 2022.
  • The Rebirth of VMWare . [Here]. Date published: 26 March 2022.
  • Military Grade Encryption AES 1024 Snake Oil Crypto . [Here]. Date published: 26 March 2022.
  • Why Aren t We All Using FIDO2 For Corporate Systems. [Here]. Date published: 21 March 2022.
  • Oh Go on Write Your Own Smart Contract. [Here]. Date published: 19 March 2022.
  • Can you prove that you know the answer to a question without revealing the answer . [Here]. Date published: 18 March 2022.
  • Why After 40 Years Are We Still Using Unencrypted and Unverified Email . [Here]. Date published: 12 March 2022.
  • Back doors A New PKI Infrastructure and A New Trust Infrastructure for the Internet . [Here]. Date published: 12 March 2022.
  • Test of Time Curve 25519 and PAKE. [Here]. Date published: 10 March 2022.
  • Redacting Data and Trusted Signatures. [Here]. Date published: 8 March 2022.
  • The Samsung Phone Vulnerability Isn t Just An Old Attack it is Extremely Bad Coding . [Here]. Date published: 6 March 2022.
  • Crypto Bug in Samsung Galaxy Devices Breaking Trusted Execution Environments TEEs . [Here]. Date published: 5 March 2022.
  • Running A Small Web Site In AWS. [Here]. Date published: 3 March 2022.
  • Trusted IoT Linking IoT Devices to NFTs. [Here]. Date published: 1 March 2022.
  • The Security of Marketplaces for NFTs. [Here]. Date published: 1 March 2022.
  • Moving secrets from a war zone Keyless SSL. [Here]. Date published: 26 February 2022.
  • Breaking A Crypto Rainbow. [Here]. Date published: 26 February 2022.
  • The Science of Password Hashing Not . [Here]. Date published: 21 February 2022.
  • The Rise of the Machines And the name A I Hart ly . [Here]. Date published: 20 February 2022.
  • Multiple Signers and Key Aggregation with Schnorr. [Here]. Date published: 20 February 2022.
  • A Cybersecurity Tongue Twister Some Simple Signature So Something Schnorr. [Here]. Date published: 20 February 2022.
  • The Rise and Rise of Encrypted Attacks Ransomware and Watch Out for Rebate Claim and Debt. [Here]. Date published: 19 February 2022.
  • Schnorr Signatures How To Sign and Merge Public Keys with Multiple Signers . [Here]. Date published: 19 February 2022.
  • Now Meet Blake 2 In Hardware. [Here]. Date published: 19 February 2022.
  • The Strange Tail of Nelson Mandela The NSA and A Backdoor Cipher. [Here]. Date published: 17 February 2022.
  • Cisco Splunk and Innovation. [Here]. Date published: 16 February 2022.
  • Happy Birthday To The Code I Use Every Single Day and Which Has Supported My Teaching and Research . [Here]. Date published: 15 February 2022.
  • Finally Building a Solid and Rusty Foundation for the Internet. [Here]. Date published: 13 February 2022.
  • Proxy Re Encryption Allowing Alice To Share Her Protect Secret Key With Bob. [Here]. Date published: 12 February 2022.
  • Key based Hashing. [Here]. Date published: 12 February 2022.
  • Homomophic Hashes Efficient Trust and Avoiding Complex Hashing Operations. [Here]. Date published: 12 February 2022.
  • What goes around comes around again Welcome Code based Cryptograph. [Here]. Date published: 10 February 2022.
  • Thank you to Adrien Marie Legendre and Carl Gustav Jacob Jacobi for their symbols. [Here]. Date published: 8 February 2022.
  • Knowing Your Nearest Neighbour Meet Euclidian Distances. [Here]. Date published: 7 February 2022.
  • A Rusty Key At The Core of Cybersecurity is Random Numbers. [Here]. Date published: 6 February 2022.
  • What s the Fastest Crypto Hash Around and Can I Generate An Encryption Key and a MAC . [Here]. Date published: 5 February 2022.
  • One of the Greatest Cybersecurity Challenge in the Next Decade Post Quantum Cryptography. [Here]. Date published: 5 February 2022.
  • Hyper Log Log A Simple Estimation of The Number of Unique Elements in a Large Data Set. [Here]. Date published: 3 February 2022.
  • The League Table of Post Quantum Cryptography PQC . [Here]. Date published: 1 February 2022.
  • Test Results for Post Quantum Cryptography. [Here]. Date published: 31 January 2022.
  • From Smooth to Dot to Dot Meet The Curve That Protects Your Online Security Like No Other. [Here]. Date published: 31 January 2022.
  • What s At The Core of Cybersecurity on the Internet Well it probably includes ECDH. [Here]. Date published: 30 January 2022.
  • Digitally Signing For Something And Checking Without Revealing The Message Meet AAI Encryption. [Here]. Date published: 29 January 2022.
  • Golang and Cryptography. [Here]. Date published: 25 January 2022.
  • HMAC and HKDF. [Here]. Date published: 23 January 2022.
  • Everything You Want To Know About AES But Were Afraid To Ask . [Here]. Date published: 22 January 2022.
  • Helping Making Digital Investigations More Scientific Meet Napier One. [Here]. Date published: 20 January 2022.
  • For Post Quantum Don t Dismiss Isogenies One of the Smallest Key Sizes for PQC. [Here]. Date published: 20 January 2022.
  • Taher Elgamal One of the Fathers of SSL and Creator of ElGamal Encryption. [Here]. Date published: 18 January 2022.
  • Horst Feistel The Feistel Cipher and a bit of Rus. [Here]. Date published: 18 January 2022.
  • We Give Away Too Many of our Digital Secrets Here s Verifiable Oblivious Pseudorandom Functions . [Here]. Date published: 17 January 2022.
  • Hash To Curve With Cloudflare CIRCL. [Here]. Date published: 16 January 2022.
  • When Distributed Ledgers and Trust Infrastructures Just Become As Natural As Ethernet and SQL . [Here]. Date published: 15 January 2022.
  • The Answer to Life The Universe and Cybersecurity . [Here]. Date published: 15 January 2022.
  • eXtendable Output Functions XOFs . [Here]. Date published: 14 January 2022.
  • Towards Web3 Ed25519 Ed448 and Ed2551 Dilithium. [Here]. Date published: 13 January 2022.
  • Beam Me Up Scotty And Some Dilithium Crystals. [Here]. Date published: 12 January 2022.
  • Towards Zero Knowledge Pairing based Cryptography using CIRCL. [Here]. Date published: 11 January 2022.
  • Towards Larger Public Keys For Key Exchange. [Here]. Date published: 11 January 2022.
  • The End Game For a Post Quantum Computer Era Isogenies . [Here]. Date published: 11 January 2022.
  • Get Ready For The Great Cybersecurity Reboot. [Here]. Date published: 11 January 2022.
  • In A World Of Privacy The Time Has Come For Paillier Encryption To Step Forward. [Here]. Date published: 10 January 2022.
  • The Tensions Around The RSA Method. [Here]. Date published: 9 January 2022.
  • Bloom Filters Merkle Trees and Accumulators. [Here]. Date published: 9 January 2022.
  • So Where is Kln sna . [Here]. Date published: 8 January 2022.
  • Can I Prove To You I Have Added Data Without Revealing Any Other Data . [Here]. Date published: 8 January 2022.
  • RSA Accumulators And Proving Knowledge. [Here]. Date published: 7 January 2022.
  • Add and Removing Data from ECC Accumulators. [Here]. Date published: 7 January 2022.
  • Towards Tokenization and Tethered Token. [Here]. Date published: 6 January 2022.
  • Can I Reveal Part of My Answer To You Without Revealing The Rest of It . [Here]. Date published: 6 January 2022.
  • Towards Cryptographic Privacy and Trust in Financal Transactions Meet Halo zkSnarks and Trusted . [Here]. Date published: 5 January 2022.
  • Pallas and Elliptic Curves. [Here]. Date published: 4 January 2022.
  • Doing What It Says on The Crypto Tin Verified Cryptography Code For Everyone. [Here]. Date published: 4 January 2022.
  • Bufferbloat The Blind Men and the Elephant. [Here]. Date published: 4 January 2022.
  • If you are serious about learning the principles there is no better book than the Handbook of . [Here]. Date published: 3 January 2022.
  • Hashing Data To A Scalar and to a Point in ECC. [Here]. Date published: 3 January 2022.
  • Happy Mining Birthday to Bitcoin. [Here]. Date published: 3 January 2022.
  • Verifiable Random Functions VRF . [Here]. Date published: 2 January 2022.
  • It s a Lattice Bake off and is there a Show stopper . [Here]. Date published: 2 January 2022.
  • Can We Recover The Public Key from an ECDSA Signature . [Here]. Date published: 2 January 2022.
  • Verifiable Encryption With ElGamal and Kryptology using Golang. [Here]. Date published: 1 January 2022.
  • Make 2022 The Year of Innovation and Learning. [Here]. Date published: 31 December 2021.
  • Camenisch Shoup Verifiable Encryption using Kryptology and Golang. [Here]. Date published: 31 December 2021.
  • What s The Difference Between ECDSA and EdDSA . [Here]. Date published: 30 December 2021.
  • Threshold Ed25519 It s Just Magical And Fit For A More Resilient and Trusted Worl. [Here]. Date published: 30 December 2021.
  • Patents Changing the World Or Not . [Here]. Date published: 30 December 2021.
  • Yes Of course I will continue to update it . [Here]. Date published: 29 December 2021.
  • Threshold ECDSA Using GG20. [Here]. Date published: 29 December 2021.
  • The library is great . [Here]. Date published: 29 December 2021.
  • An Any t from n Threshold ECDSA Scheme using GG20 Krytology and Golang. [Here]. Date published: 29 December 2021.
  • The Integers We Use In Programs Are Just So Small . [Here]. Date published: 28 December 2021.
  • ECDSA Satoshi s Genius Selection or A Burden on A More Distributed and Resilent World . [Here]. Date published: 28 December 2021.
  • Can I Use Distributed Key Generation DKG and ECDSA Signatures Yes with DKLS. [Here]. Date published: 27 December 2021.
  • What Happens When The Dealer Leaves The Game Can We Continue Meet AVSS. [Here]. Date published: 26 December 2021.
  • Building a More Trusted Citizen Focused World . [Here]. Date published: 24 December 2021.
  • Making The Card Game Honest For The Players and The Dealer Meet Feldman Verifiable Secret Shares. [Here]. Date published: 23 December 2021.
  • In The Days Before LaTeX PCs and Wordprocessors There Were Typewriters Tipex and Pen. [Here]. Date published: 23 December 2021.
  • Homomorphic Subtraction Is So Much More Useful Than Homomorphic Addition . [Here]. Date published: 22 December 2021.
  • Big Integers and Some Crypto Homomorphic Magic. [Here]. Date published: 22 December 2021.
  • Towards Total Encryption. [Here]. Date published: 21 December 2021.
  • Building A New Digital World Threshold Signing and Key Distribution Generation. [Here]. Date published: 21 December 2021.
  • Log4j The Worst Vulnerability In Nearly A Decade . [Here]. Date published: 20 December 2021.
  • Key Distribution Generators using FROST and Kryptology. [Here]. Date published: 20 December 2021.
  • HVZK Honest Verifier Zero Knowledge For RSA and Using Kryptology. [Here]. Date published: 20 December 2021.
  • HVZK Honest Verifier Zero Knowledge For Paillier and Using Kryptology. [Here]. Date published: 19 December 2021.
  • Proving You Know The Answer Without Revealing It Using Crypto Pairs and Kryptology. [Here]. Date published: 18 December 2021.
  • Encrypted Word Searches Using Golang and Kryptolo. [Here]. Date published: 18 December 2021.
  • Cracking Elliptic Curves Using Pairing and Kryptology. [Here]. Date published: 17 December 2021.
  • BLS Signatures Fast Efficient and Short Checked With The Magic of Crypto Pairing. [Here]. Date published: 15 December 2021.
  • Where Would You Find 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81 . [Here]. Date published: 14 December 2021.
  • The Wonderful BLS12 Curves Just Ready For a Privacy Respecting World. [Here]. Date published: 14 December 2021.
  • Homomorphic Addition and Subtraction using ElGamal. [Here]. Date published: 13 December 2021.
  • Elliptic Curves Base Points and Scalars. [Here]. Date published: 13 December 2021.
  • My Ice Cream was Too Cold . [Here]. Date published: 12 December 2021.
  • Building a More Trusted Data World Authenticated ElGamal Encryption using Kryptology. [Here]. Date published: 12 December 2021.
  • Pedersen Verifiable Secret Shares PVSS Commitments and Spotting A Bad Dealer and a Cheating . [Here]. Date published: 11 December 2021.
  • The Magic of Shamir Secret Shares and Elliptic Curves. [Here]. Date published: 10 December 2021.
  • Zero Knowledge Proofs and Accumulators Using Kryptography and Crypto Pairings. [Here]. Date published: 9 December 2021.
  • There s A New Crypto Library In Town And This One Focuses on Privacy Kryptology. [Here]. Date published: 9 December 2021.
  • Shamir Secret Shares and Kryptology. [Here]. Date published: 9 December 2021.
  • Digital Forensics Christmas Trivia Facts. [Here]. Date published: 8 December 2021.
  • There Is Beauty in Cybersecurity Bare Bones RSA in Rus. [Here]. Date published: 5 December 2021.
  • Galois field GF 2 and Rust. [Here]. Date published: 5 December 2021.
  • Integer Factorization using Rust. [Here]. Date published: 4 December 2021.
  • Rusty Smooth Numbers. [Here]. Date published: 3 December 2021.
  • Both of these are stream ciphers and not block so they can both run in a parallel processing mode . [Here]. Date published: 3 December 2021.
  • Signcryption MIRACL and Rust. [Here]. Date published: 28 November 2021.
  • Proving You Know Answer to a Quadratic Equation Without Giving The Answer using Rust Crypto . [Here]. Date published: 28 November 2021.
  • Encrypted Searches Using Crypto Pairing Rust and MIRACL. [Here]. Date published: 28 November 2021.
  • The First Rust Governance Crisis . [Here]. Date published: 27 November 2021.
  • Rust Crypto Pairing and When Bob Met Alice And Met Carol. [Here]. Date published: 27 November 2021.
  • Crypto Pairing With Rust The MIRACL Way. [Here]. Date published: 27 November 2021.
  • In Rust We Trust The Mighty Schnorr Signature. [Here]. Date published: 26 November 2021.
  • Adding Public Keys Part 1 The Schnorr Way. [Here]. Date published: 26 November 2021.
  • Breaking GPUs When Is A Hash Not Just A Single Hash . [Here]. Date published: 25 November 2021.
  • Rust Never Sleeps. [Here]. Date published: 21 November 2021.
  • HMAC SHA256 and Rust. [Here]. Date published: 21 November 2021.
  • Curve 25519 and Rust. [Here]. Date published: 21 November 2021.
  • The Near Perfect Encryption Method and The Best Programming Language Meet AES GCM and Rust. [Here]. Date published: 20 November 2021.
  • So What Is AEAD And Why Is It So Important for Encryption . [Here]. Date published: 20 November 2021.
  • ChaCha20 and Rus. [Here]. Date published: 20 November 2021.
  • 96 bit Nonces Too Small Try XChaCha20 and Rust. [Here]. Date published: 20 November 2021.
  • How Do You Slow Down Rust Use the PBKDF2 solution. [Here]. Date published: 19 November 2021.
  • Which Encryption Method Does An Encrypts On Either Side. [Here]. Date published: 17 November 2021.
  • Have You Forgotten To Take Out The Garbage No Need With Rust . [Here]. Date published: 17 November 2021.
  • Yes I agree . [Here]. Date published: 15 November 2021.
  • Maths v Law To Fork or Not To Fork That Is The Question. [Here]. Date published: 15 November 2021.
  • 2K Articles And My Little Scratchpad of Learning. [Here]. Date published: 15 November 2021.
  • Rusty RSA. [Here]. Date published: 14 November 2021.
  • Rust and Bulletproofs Towards A More Trusted and Private Digital World. [Here]. Date published: 14 November 2021.
  • Rust and 3 way Diffie Hellman. [Here]. Date published: 14 November 2021.
  • For Perfect Security and Data Resilience Here s Shamir Secret Shares and Rust. [Here]. Date published: 14 November 2021.
  • Can Alice Encrypt With Her Public Key and Bob Decrypts With His Private Key . [Here]. Date published: 14 November 2021.
  • A Rusty Ribbon and a Cipher . [Here]. Date published: 14 November 2021.
  • Blakingly Fast Hashing in Rust. [Here]. Date published: 14 November 2021.
  • Proof of Space and Time . [Here]. Date published: 13 November 2021.
  • Password Entropy. [Here]. Date published: 13 November 2021.
  • How Can I Send You A Christmas Present But For You Not To Cheat and Open It . [Here]. Date published: 13 November 2021.
  • How Can I Get You To Do a Difficult Piece of Maths . [Here]. Date published: 12 November 2021.
  • Coathangers for 140 An Etsy Hack. [Here]. Date published: 12 November 2021.
  • I am only stating the evidence given at the court case . [Here]. Date published: 10 November 2021.
  • So What Is Lattice Encryption . [Here]. Date published: 9 November 2021.
  • Python has a good set of polynomial libraries for illustration but in real life we need normally . [Here]. Date published: 9 November 2021.
  • A Story of ABCD Alice Bob Craig and Dave So Is Craig is Satoshi and Did He Partner with Dave . [Here]. Date published: 7 November 2021.
  • The Wonderful World of Hashing Some Biba Entropy Calculations and Virtually Every Hashing . [Here]. Date published: 6 November 2021.
  • MVC Model View and Controller For Me It Is The Right Way To Develop For The Web. [Here]. Date published: 6 November 2021.
  • Data Distributions and Charting in Python. [Here]. Date published: 3 November 2021.
  • Bitwise Operations In Python. [Here]. Date published: 3 November 2021.
  • Bit Twiddling in Python. [Here]. Date published: 3 November 2021.
  • IoT Security Meet RED and Security By Design and By Deaful. [Here]. Date published: 2 November 2021.
  • Bitcoin Becomes a Teenager. [Here]. Date published: 2 November 2021.
  • EU Green Passport System Breach A Large Scale Leak of Private Keys or A Human Trust Breakdown . [Here]. Date published: 31 October 2021.
  • Four Generations of Homomorphic Encryption And An Eigth fold Improvement Each Year As Defined By. [Here]. Date published: 25 October 2021.
  • Why Do We Say It is probably prime Surely it is or it isn t . [Here]. Date published: 24 October 2021.
  • A Bit of Miller and Rabin. [Here]. Date published: 24 October 2021.
  • What s Special About 561 It s A Number That That Tricks The Fermat Prime Number Test. [Here]. Date published: 23 October 2021.
  • Python No 1. [Here]. Date published: 23 October 2021.
  • Planning for a Quantum Robust Digital World. [Here]. Date published: 22 October 2021.
  • On Global Encryption Day A Practical Guide to Homomorphic Encryption. [Here]. Date published: 22 October 2021.
  • The Wonderful World of Digital Signatures ECDSA EdDSA BLS CL Merkle and so much more. [Here]. Date published: 20 October 2021.
  • The New Way To Create A Secure Tunnel The WireGuard Protocol. [Here]. Date published: 18 October 2021.
  • So What Is PKCS 7 . [Here]. Date published: 17 October 2021.
  • How Do Your Prevent Cipher Playback Well With Associated Data Meet Poly1305. [Here]. Date published: 17 October 2021.
  • I Know HMAC But What s CMAC . [Here]. Date published: 16 October 2021.
  • Bugs In Your Pocket . [Here]. Date published: 15 October 2021.
  • G is a standard point on the curve so if we know the curve type we know the base point . [Here]. Date published: 11 October 2021.
  • Decrypting Ciphertext. [Here]. Date published: 10 October 2021.
  • The Swiss Army Knife of Cybersecurity OpenSSL. [Here]. Date published: 9 October 2021.
  • If You Don t Want AES and ChaCha20 There s SM4. [Here]. Date published: 9 October 2021.
  • What s The Base Point for Ed25519 . [Here]. Date published: 5 October 2021.
  • How Facebook Took Themselves Off The Internet A Lesson In Resiliance And A Need To Decentralise. [Here]. Date published: 5 October 2021.
  • An Efficient and Secure Key Exchange Method X25519 and Blake2b. [Here]. Date published: 3 October 2021.
  • Well done NHS Scotland From a Fire a Phoenix Can Rise. [Here]. Date published: 2 October 2021.
  • Please Can The Public Sector Prove My ID Once And Get On With It . [Here]. Date published: 1 October 2021.
  • Bob Sends Alice A Box. [Here]. Date published: 27 September 2021.
  • So What Is XChaCha20 . [Here]. Date published: 26 September 2021.
  • Where Would You Find a Cuckoo In Cybersecurity . [Here]. Date published: 19 September 2021.
  • In RSA we have e d N p and q but what are dQ dP and InvQ . [Here]. Date published: 19 September 2021.
  • CBOR COSE and RSA Key Pairs. [Here]. Date published: 18 September 2021.
  • ECDH and CEK Content Encryption Key using COSE and CBOR. [Here]. Date published: 12 September 2021.
  • The Wonderful World of Tokens and Claims CWT CBOR Web Tokens. [Here]. Date published: 8 September 2021.
  • Beware of Vaccination Certificate Scams Even Scammers Have Secure Connections Now. [Here]. Date published: 7 September 2021.
  • Scottish QR Code Vaccination Status and EU Green Pas. [Here]. Date published: 5 September 2021.
  • In IoT How Can We Represent Binary Data Objects and Integrate Security . [Here]. Date published: 5 September 2021.
  • So What Is Base 45 And Where Is It Used . [Here]. Date published: 4 September 2021.
  • Less haste more speed Base45 zlib and Vaccine Passports. [Here]. Date published: 4 September 2021.
  • In most cases I aim to engage readers into cryptography I just outline some principles and and try . [Here]. Date published: 25 August 2021.
  • Dominic Cummings and Instant Auditing Accounting. [Here]. Date published: 25 August 2021.
  • Moving Into The 21st Century. [Here]. Date published: 23 August 2021.
  • Cyber Security and Fibonacci Random Numbers and Hashing. [Here]. Date published: 20 August 2021.
  • FalkHash Exotic Probably Shitty Hash Makes Me Smile. [Here]. Date published: 18 August 2021.
  • SipHash A Classic Tale of a Fix For A Problem. [Here]. Date published: 16 August 2021.
  • For Crypto Speed Taking The Highway is Great. [Here]. Date published: 16 August 2021.
  • The Universal Hash and The HalftimeHash. [Here]. Date published: 15 August 2021.
  • xxHash Fast Fast Fas. [Here]. Date published: 12 August 2021.
  • For Hashing The Fastest of the Fastest Meet t1ha. [Here]. Date published: 11 August 2021.
  • For Limited Capability Processors here s the Pearson Hash. [Here]. Date published: 10 August 2021.
  • Load balancing Hashtables and Consistent Hashing. [Here]. Date published: 9 August 2021.
  • Apple s CSAM System Walking A Fine Balance . [Here]. Date published: 9 August 2021.
  • Blooming Great The Birth of Cyan Forensics. [Here]. Date published: 8 August 2021.
  • C and C Still Alive and Kicking . [Here]. Date published: 6 August 2021.
  • Which is the fastest hashing method and has O 1 complexity . [Here]. Date published: 29 July 2021.
  • Meow The Infinite The Fastest Key based Hash Around . [Here]. Date published: 29 July 2021.
  • Simplifying Shor s Method. [Here]. Date published: 28 July 2021.
  • Cloudflare A Great Service and Company. [Here]. Date published: 27 July 2021.
  • PCQ is No Picnic. [Here]. Date published: 26 July 2021.
  • Crypto In Single Library. [Here]. Date published: 26 July 2021.
  • Teaching With Jupyter Notebooks. [Here]. Date published: 23 July 2021.
  • How Do We Defend Against Cipher Playbacks Meet AEAD. [Here]. Date published: 22 July 2021.
  • How Do You Measure How Good Your Company s Security Is Well FIPS 140 Is One Measure. [Here]. Date published: 20 July 2021.
  • How Do We Protect An Encryption Key Meet Key Wrapping. [Here]. Date published: 18 July 2021.
  • ECDH using Python and Hazmat. [Here]. Date published: 18 July 2021.
  • Moving Into The 21st Century for Data Scrypt Tokenization and Python. [Here]. Date published: 17 July 2021.
  • ECDSA Python and Hazmat. [Here]. Date published: 16 July 2021.
  • Elliptic Curve Keys Pythonand Hazmat. [Here]. Date published: 15 July 2021.
  • RSA Signatures Python and Hazmat. [Here]. Date published: 14 July 2021.
  • Hazmat Python and RSA Encryption. [Here]. Date published: 14 July 2021.
  • The Ohm s Law of Cybersecurity . [Here]. Date published: 13 July 2021.
  • From The Security Theater Meet The Hygiene Theate. [Here]. Date published: 12 July 2021.
  • Symmetric Key Hazmat and Python. [Here]. Date published: 11 July 2021.
  • Creating An Encryption Key from a Passphrase. [Here]. Date published: 11 July 2021.
  • Python Cryptography and Hazmat. [Here]. Date published: 10 July 2021.
  • Instant Auditing Meet The Merkle Patricia Tree. [Here]. Date published: 10 July 2021.
  • Analysing The Bitcoin Network Did you know that the EU has the largest number of miners and peers . [Here]. Date published: 10 July 2021.
  • Kittens v Kangaroos. [Here]. Date published: 8 July 2021.
  • Until We Get Better at Trusted Environments Attacks Like Kaseya Will Continue. [Here]. Date published: 7 July 2021.
  • The Nightmare of Supply Chain Threats Becomes Real Meet the Kaseya Attack. [Here]. Date published: 5 July 2021.
  • A Bitcoin wallet addresses 1 or 3 . [Here]. Date published: 5 July 2021.
  • Don t Over egg Your Profile . [Here]. Date published: 4 July 2021.
  • Automous Machines Sci fi becomes Science Fact. [Here]. Date published: 3 July 2021.
  • ERC721 Sir Tim and Saying Hello To A Tokenized Worl. [Here]. Date published: 1 July 2021.
  • Casanova and A Post Quantum World. [Here]. Date published: 30 June 2021.
  • The Future is ARMed. [Here]. Date published: 29 June 2021.
  • Sophie Germain and Safe Primes. [Here]. Date published: 21 June 2021.
  • The MALICIOUS framework Tweakable Block Ciphers. [Here]. Date published: 13 June 2021.
  • Low Multiplicative Complexity LowMC. [Here]. Date published: 11 June 2021.
  • Let s Go For A Post Quantum Picnic. [Here]. Date published: 10 June 2021.
  • Haraka v2 The Short Input Hash. [Here]. Date published: 7 June 2021.
  • Under Starters Orders It s A Three Horse Race Dilithium Rainbow and Falcon But Who Will Win . [Here]. Date published: 6 June 2021.
  • SPHINCS A Hash based Quantum Robust Method. [Here]. Date published: 6 June 2021.
  • Rainbow The PCQ Oil and Vineger Method Small Signatures But Larger Keys than Lattice . [Here]. Date published: 4 June 2021.
  • The Great Fire of Ransomware Should The Insurance Industry Take a Lead In Improving . [Here]. Date published: 4 June 2021.
  • Venus Is Just Two Minutes Away When Fibre is Not Glass and Unbreakable Wi fi. [Here]. Date published: 1 June 2021.
  • Goodbye RSA and ECC And Hello To Polynomial Rings X N 1 . [Here]. Date published: 31 May 2021.
  • An Alternative Diffie Hellman Method and What is mod 1. [Here]. Date published: 29 May 2021.
  • When You Break Something It Is Good To Fix It. [Here]. Date published: 27 May 2021.
  • Building For A Secure Future Goodbye ECC and Hello To SABER Kyber NTRU or McEliece or even . [Here]. Date published: 25 May 2021.
  • Sometimes in Cybersecurity Boring is Good. [Here]. Date published: 22 May 2021.
  • Elliptic Curves Still Hanging On In There in a Post Quantum World . [Here]. Date published: 18 May 2021.
  • Isogenies The End Game for Public Key Encryption . [Here]. Date published: 17 May 2021.
  • SABER Learning with Rounding For Post Quantum Crypto It s All About Lattice. [Here]. Date published: 16 May 2021.
  • Lattice Polynomials and NumPy. [Here]. Date published: 16 May 2021.
  • The Magic of Lattice and The Eye of a Falcon. [Here]. Date published: 15 May 2021.
  • H spl ashing With A Sponge. [Here]. Date published: 14 May 2021.
  • The Only Way Forward for Privacy Zero. [Here]. Date published: 13 May 2021.
  • Towards A Tokenized World Article Proof of Origin. [Here]. Date published: 10 May 2021.
  • Factoring Based Signatures with Fiat Shamir for a Post Quantum World. [Here]. Date published: 10 May 2021.
  • Conversion With A Scammer B. [Here]. Date published: 10 May 2021.
  • Ssh Our Existing PKI Infrastructure and Many Cryptocurrencies Will Fail In a Post Quantum World. [Here]. Date published: 9 May 2021.
  • Beam Me Up Scotty It s a Whole New Crypto World. [Here]. Date published: 9 May 2021.
  • Tips on Cybersecurity Blog Writing. [Here]. Date published: 8 May 2021.
  • The Right Way To Hash a Password or Create an Encryption Key PBKDF2 bcrypt and scrypt. [Here]. Date published: 5 May 2021.
  • For Disk Encryption Why Doesn t The Disk Re encrypt With The New Key When I Change My Password . [Here]. Date published: 3 May 2021.
  • Encrypting The Encryption Key It s a Wrap . [Here]. Date published: 2 May 2021.
  • Digital Green Certificate DGC A Great Step Forward To Address A Problem But A Technical . [Here]. Date published: 1 May 2021.
  • Privacy and Machine Learning is it possible Meet Syft. [Here]. Date published: 28 April 2021.
  • In Cybersecurity from Luxembourgian Sponges to Towns it is Time to SPARKLE . [Here]. Date published: 27 April 2021.
  • What s Small and Efficient A Crypto Beetle. [Here]. Date published: 26 April 2021.
  • Protecting Against Side Channels with Re keying Meet Isap. [Here]. Date published: 26 April 2021.
  • Duel of the Cybersecurity Titans for Lightweight Crypto Meet Romulus. [Here]. Date published: 26 April 2021.
  • When A Sponge Helps To Make Things Secure And Light weight. [Here]. Date published: 25 April 2021.
  • In Cybersecurity Where Would You Find Dumbo Jumbo and a Pink Elephant . [Here]. Date published: 25 April 2021.
  • GIFT A Small Present for Cybersecurity and IoT. [Here]. Date published: 25 April 2021.
  • After AES NIST is Defining the Next Great Standard for Encryption Light weight Crypto. [Here]. Date published: 24 April 2021.
  • Overcoming Nonce Reuse Misuse SIV Mode. [Here]. Date published: 22 April 2021.
  • Oh Google Tink Private Key IDs and Signatures. [Here]. Date published: 20 April 2021.
  • But What Does A Digital Signature Actually Look Like . [Here]. Date published: 19 April 2021.
  • Bare Metal RSA. [Here]. Date published: 17 April 2021.
  • DER ASN 1 and Crypto formatting. [Here]. Date published: 16 April 2021.
  • ECDSA and EdDSA. [Here]. Date published: 14 April 2021.
  • Epione Lightweight Contract Tracing with Strong Privacy. [Here]. Date published: 12 April 2021.
  • Preserving Privacy Borromean Ring Signing. [Here]. Date published: 7 April 2021.
  • MuSig A Secure Method of Merging Public Keys with a Single Signature. [Here]. Date published: 7 April 2021.
  • Merging Public Keys Aggregated Signing with Schnor. [Here]. Date published: 6 April 2021.
  • Some ECC Types and Operations. [Here]. Date published: 5 April 2021.
  • Still using ECDSA Think again and consider EdDSA. [Here]. Date published: 4 April 2021.
  • A Chat With One of The Creators of The Foundations of Cybersecurity Len Adleman. [Here]. Date published: 2 April 2021.
  • Piger Fabrica Crypto flaw found. [Here]. Date published: 1 April 2021.
  • Towards A More Distributed Trusted and Resilient Data World. [Here]. Date published: 27 March 2021.
  • Non interactive Zero Knowledge Proof of Discrete Log Quality. [Here]. Date published: 27 March 2021.
  • The Immunisation Programme A Lost Opportunity in Proper Digital Citizen Integration in Health . [Here]. Date published: 20 March 2021.
  • The Weaknesses of MD5 SHA1 and SHA 256 The Length Extension Attack. [Here]. Date published: 15 March 2021.
  • The Indifferentiability Property for the Perfect Message Hash. [Here]. Date published: 11 March 2021.
  • Our Cybersecurity Foundation Is Crumbling . [Here]. Date published: 3 March 2021.
  • Secret Sharing of ECDSA. [Here]. Date published: 21 February 2021.
  • ECDSA Revealing the private key from four signed message two keys and shared nonces SECP256k1 . [Here]. Date published: 23 January 2021.
  • ECDSA Weakness Where Nonces Are Reused. [Here]. Date published: 22 January 2021.
  • Jacob Ziv The Man Who Compressed The World. [Here]. Date published: 18 January 2021.
  • Trusted Generation of Public Keys Based on Your Identity. [Here]. Date published: 17 January 2021.
  • The End Game Governments and Social Media Networks Together Will Govern The World. [Here]. Date published: 16 January 2021.
  • Let 2021 Be The Year of Anonymity and Trust Meet The Camenisch Lysyanskaya Signature. [Here]. Date published: 14 January 2021.
  • Koblitz and Miller Built The Foundation of Security For Our Internet. [Here]. Date published: 12 January 2021.
  • An iPad and a RPI. [Here]. Date published: 4 January 2021.
  • Galios Fields GF 2 n . [Here]. Date published: 3 January 2021.
  • Conference Keying From Napier s Logs to Elliptic Curves. [Here]. Date published: 31 December 2020.
  • Those Pesky Certs. [Here]. Date published: 30 December 2020.
  • 2020 The Year of Zoom . [Here]. Date published: 30 December 2020.
  • Back To The Future. [Here]. Date published: 29 December 2020.
  • Good Ridence to 2020 and Hello To Learning New Things in 202. [Here]. Date published: 28 December 2020.
  • EKE It s PAKE . [Here]. Date published: 24 December 2020.
  • Password Juggling in Discrete Logs and Elliptic Curves. [Here]. Date published: 23 December 2020.
  • A Social Distanced Santa Sends Secure Presents. [Here]. Date published: 22 December 2020.
  • Post quantum Lattice Polynomials and Modulo. [Here]. Date published: 21 December 2020.
  • Bob and Alice Have a Secret . [Here]. Date published: 20 December 2020.
  • When Teaching Mirrors Real life Sunburst Solarwind and Soaring Cybersecurity Stock Prices. [Here]. Date published: 19 December 2020.
  • The MVQ Method Authenticated Key Exchange. [Here]. Date published: 18 December 2020.
  • How Do I Prove I Know The Answer to x x 42 Without Giving You The Answer . [Here]. Date published: 18 December 2020.
  • A Happy Xmas Cipher. [Here]. Date published: 18 December 2020.
  • Saying Goodbye to Napier s Logs and Hello To Elliptic Curves. [Here]. Date published: 13 December 2020.
  • What s The Order in ECC . [Here]. Date published: 12 December 2020.
  • A Bluffer s Guide to secp256k. [Here]. Date published: 12 December 2020.
  • Authenticated ECDH In Python using X25519. [Here]. Date published: 9 December 2020.
  • Putting The Citizen First Blockpass ID Lab Awarded Two Citizen focused Smart City Research . [Here]. Date published: 8 December 2020.
  • Ed RIP. [Here]. Date published: 8 December 2020.
  • Clamping . [Here]. Date published: 7 December 2020.
  • Two pass Diffie Hellman MTI A0. [Here]. Date published: 5 December 2020.
  • Ready to Sign Go Get a Witness And Make Them Nice and CoSi . [Here]. Date published: 5 December 2020.
  • When Miller Met Rabin Magic Happened . [Here]. Date published: 2 December 2020.
  • When Research Papers Had Two Pages And A Few References But Were Still Great Lehmann s . [Here]. Date published: 29 November 2020.
  • Meet Satoshi From the UK . [Here]. Date published: 28 November 2020.
  • The Lucas Lehmer Test For Mersenne Primes. [Here]. Date published: 27 November 2020.
  • There Is No Advantage In Play At Home in a Time of COVID 19. [Here]. Date published: 24 November 2020.
  • Research Quality Gives Better Student Experience Not Proven . [Here]. Date published: 24 November 2020.
  • Can RSA Be Cracked Well Yes . [Here]. Date published: 21 November 2020.
  • Towards Coding For All. [Here]. Date published: 14 November 2020.
  • The Brickell Gordon McCurley and Wilson BGMW Method for Fast Exponentiation with Precomputed . [Here]. Date published: 14 November 2020.
  • Privacy preserving Ticket Booking With Commutative Encyption. [Here]. Date published: 8 November 2020.
  • The Massey Omura Cryptosystem A Public Key Commutative encryption Method. [Here]. Date published: 7 November 2020.
  • A Timeline of Spin out Success Innovation Involves Many Hands. [Here]. Date published: 6 November 2020.
  • Euler The Father of Mathematics and Layer of Internet Security. [Here]. Date published: 1 November 2020.
  • The Patents That Built The Security of The Internet Sharmir Fiat Schnorr Brachtl GQ and . [Here]. Date published: 31 October 2020.
  • Online Offline Signatures. [Here]. Date published: 31 October 2020.
  • Quantum Key Distribution RIP . [Here]. Date published: 28 October 2020.
  • IT S ALL GREEK TO ME The Six Patents That Laid The Foundations of Cybersecurity. [Here]. Date published: 25 October 2020.
  • In A World With No Encryption Keys Shamir s No key Protocol. [Here]. Date published: 24 October 2020.
  • Conference keying the Burmester Desmedt method. [Here]. Date published: 24 October 2020.
  • ESIGN. [Here]. Date published: 23 October 2020.
  • Recovering a Message From a Signature. [Here]. Date published: 20 October 2020.
  • Proving a Forged Signature The Fail stop Signature Method. [Here]. Date published: 17 October 2020.
  • Online Teaching Can Be Fun . [Here]. Date published: 15 October 2020.
  • IBM s Greatest Challenge . [Here]. Date published: 12 October 2020.
  • Bob is this YOUR signature Yes I can prove it here . [Here]. Date published: 12 October 2020.
  • Blind Signatures. [Here]. Date published: 12 October 2020.
  • Let s Talk About Encryption Again . [Here]. Date published: 11 October 2020.
  • Knowing Where You Have Been. [Here]. Date published: 11 October 2020.
  • An Interview with Torben P Pedersen. [Here]. Date published: 11 October 2020.
  • So What s A Blum Integer . [Here]. Date published: 10 October 2020.
  • RSA and Random Bitstream Generators. [Here]. Date published: 10 October 2020.
  • Have Linux You d Better Check for CVE 2020 14386. [Here]. Date published: 9 October 2020.
  • Remember When We All Got Out More My Twitter Scrapbook 2015 2016 . [Here]. Date published: 6 October 2020.
  • A Practical Example for McEliece Cryptography. [Here]. Date published: 6 October 2020.
  • The Package That Never Grew Up Microsoft Excel. [Here]. Date published: 5 October 2020.
  • The barriers to getting into machine learning have never been lower Go do on ML. [Here]. Date published: 3 October 2020.
  • Oil and Vinegar Makes A Hard Problem Ea. [Here]. Date published: 27 September 2020.
  • For The Love of Crypto and Solving Mysteries Meet Dan Shamow. [Here]. Date published: 22 September 2020.
  • Somewhere Over The Rainbow There s A Hard Problem. [Here]. Date published: 20 September 2020.
  • Being Different Is Good Help Diversity Thrive. [Here]. Date published: 19 September 2020.
  • Tips on Engaging Readers in Cybersecurity and Computer Science My Top 10. [Here]. Date published: 18 September 2020.
  • Polynomials Mod p and Numpy. [Here]. Date published: 12 September 2020.
  • Watch Out For Those Pesky Cyber Raccoons . [Here]. Date published: 10 September 2020.
  • The Trap Door with Polynomials Towards a Post Quantum Crypto Era. [Here]. Date published: 5 September 2020.
  • Tom Saves MicroTails. [Here]. Date published: 3 September 2020.
  • Testing Testing Testing 123. [Here]. Date published: 2 September 2020.
  • One Little Method Secures You On line Your CryptoWallet And Your Wi fi Meet The Tortoise. [Here]. Date published: 1 September 2020.
  • The Most Horrible and Amazing Lanaguge JavaScript. [Here]. Date published: 31 August 2020.
  • Recovering Your Cryptowallet. [Here]. Date published: 31 August 2020.
  • Creating A Digitally Focused Generation. [Here]. Date published: 31 August 2020.
  • Blakley Secret Sharing. [Here]. Date published: 29 August 2020.
  • Secret Shares With Chinese Remainder Theory CRT . [Here]. Date published: 28 August 2020.
  • When Alice Goes Bad Byzantine Secret Sharing. [Here]. Date published: 27 August 2020.
  • The Cost of Data Breaches. [Here]. Date published: 25 August 2020.
  • Computing Science should be considered as equal to other sciences or mathematics in the school . [Here]. Date published: 25 August 2020.
  • Russian Doll Prime Numbers. [Here]. Date published: 23 August 2020.
  • Jumping Champions. [Here]. Date published: 23 August 2020.
  • We Need A Blockchain Act for Every Country. [Here]. Date published: 22 August 2020.
  • In Memory of Hal Finney RIP Builder of a More Trusted World. [Here]. Date published: 22 August 2020.
  • Finally A New World Evolves . [Here]. Date published: 22 August 2020.
  • Watch Out When You Put Your Key in A Lock Someone May Be Creating A Copy Of Your K. [Here]. Date published: 19 August 2020.
  • RSA Over 40 Years Old and Still Amazing Let s Crack It. [Here]. Date published: 19 August 2020.
  • Can I Create A Hash Collision In An Instance Well Yes . [Here]. Date published: 19 August 2020.
  • How does Alice tell if she had more money than Bob but where she can t tell how many millions Bob . [Here]. Date published: 16 August 2020.
  • Clocks LaTeX Byzantine Generals and Post Quantum Crypto Meet The Amazing Leslie B Lamport. [Here]. Date published: 15 August 2020.
  • Traffic Light Hacking. [Here]. Date published: 14 August 2020.
  • I Started with KB then MB then GB Now It s PetaByte Soon Exabyte And Onto ZetaBytes . [Here]. Date published: 13 August 2020.
  • Mixing Up The Tor Network. [Here]. Date published: 11 August 2020.
  • The Sad Tale of Ransomware A New Cyberworld Evolves. [Here]. Date published: 8 August 2020.
  • Cracking ECDSA With a Leak of the Random Nonce. [Here]. Date published: 6 August 2020.
  • A Nation of Coders . [Here]. Date published: 5 August 2020.
  • When Mallory Met Eve . [Here]. Date published: 30 July 2020.
  • The DoubleWammy Ransomware Data Exfiltration. [Here]. Date published: 29 July 2020.
  • Safe Primes Goldilocks and Riddenhood. [Here]. Date published: 29 July 2020.
  • Proof of Exponentiation using Wesolowski s Theory. [Here]. Date published: 26 July 2020.
  • Meow and your data is gone. [Here]. Date published: 25 July 2020.
  • Crypto Bake Off The FINAL And It s a Lattice Bake in The Lead. [Here]. Date published: 23 July 2020.
  • Yes She needs to test they are squares . [Here]. Date published: 22 July 2020.
  • How Does Peggy Prove To Victor The Banker That Her Salary is between 30K and 100K Without . [Here]. Date published: 21 July 2020.
  • How Does Peggy Prove To Victor That She Still Knows Her Year of Birth Without Revealing It . [Here]. Date published: 19 July 2020.
  • How Can Peggy Prove To Victor That She Has Enough Cryptocurrency To Pay Him Without Revealing Her . [Here]. Date published: 19 July 2020.
  • The Twitter Compromise is Much More than a Cybersecurity Hack . [Here]. Date published: 17 July 2020.
  • Getting Rid of Passwords and Integrating Google Firebase. [Here]. Date published: 15 July 2020.
  • CryptoForHealth A Large Scale Attack on Twitter. [Here]. Date published: 15 July 2020.
  • The Beginning of The End of The Server Towards a New Serverless Cloud. [Here]. Date published: 11 July 2020.
  • Lattice The Easy and Hard Problem. [Here]. Date published: 11 July 2020.
  • A Final Farewell To TLS 1 0 and TLS 1 1 . [Here]. Date published: 9 July 2020.
  • If You Can Avoid Saving User Passwords. [Here]. Date published: 6 July 2020.
  • Big IP Gets a 10 Patch Now . [Here]. Date published: 4 July 2020.
  • Byzantine Generals And Building a More Trusted and Resiliant World. [Here]. Date published: 28 June 2020.
  • Student Experience Varies With Teaching Quality and Not Directly Research Quality. [Here]. Date published: 27 June 2020.
  • If you invest in research do you get great teaching . [Here]. Date published: 27 June 2020.
  • A Tale of Two Clouds. [Here]. Date published: 27 June 2020.
  • Splunk ing HTTPs. [Here]. Date published: 26 June 2020.
  • You re A Professor of Crip ology . [Here]. Date published: 21 June 2020.
  • Scripting Your Digital World Python is King . [Here]. Date published: 21 June 2020.
  • The Cloud Taking Back Control of Your Data World. [Here]. Date published: 20 June 2020.
  • SignCryption. [Here]. Date published: 19 June 2020.
  • As Google Whispers The Rest Should Hear Loudly. [Here]. Date published: 19 June 2020.
  • The Rise and Fall of the NHSX App. [Here]. Date published: 18 June 2020.
  • You Do Know That DocuSign Is Not Really Digital Signing . [Here]. Date published: 17 June 2020.
  • When The Cloud Jumps Into Real life Meet Snowcone. [Here]. Date published: 17 June 2020.
  • One Public Key and Thousands of Private Keys. [Here]. Date published: 17 June 2020.
  • IoT Ripples and Crumbles Again. [Here]. Date published: 16 June 2020.
  • Go on Get into Splunk and Machine Learning . [Here]. Date published: 16 June 2020.
  • Dreaming BiBa. [Here]. Date published: 15 June 2020.
  • Taking The Jump Leap to AWS Performance Costings and other things. [Here]. Date published: 14 June 2020.
  • What No Beer COVID 19 and Ransomware To Blaim . [Here]. Date published: 13 June 2020.
  • Machine Learning Prediction in Two Minutes Perfectly Predicting Your Car. [Here]. Date published: 13 June 2020.
  • Pre processing Your Data For Machine Learning using Splunk. [Here]. Date published: 12 June 2020.
  • Forcasting The Future With Splunk. [Here]. Date published: 11 June 2020.
  • Cybersecurity and Machine Learning Predicting Numeric Outliers. [Here]. Date published: 11 June 2020.
  • Anomaly Detection With Splunk. [Here]. Date published: 11 June 2020.
  • An Interview With Bruce . [Here]. Date published: 8 June 2020.
  • What Ransomware Written in Java. [Here]. Date published: 7 June 2020.
  • Where There s Money There s A Professional Scammer. [Here]. Date published: 1 June 2020.
  • Learn Machine Learing and Splunk. [Here]. Date published: 31 May 2020.
  • Zoom Finally Moves To End to End Encryption And Takes Security Seriously. [Here]. Date published: 30 May 2020.
  • What you ll keep my contact data for 20 years and store it in the Amazon public cloud . [Here]. Date published: 30 May 2020.
  • Satoshi Was British . [Here]. Date published: 30 May 2020.
  • Advice For Graduates Get Into Rust JavaScript Python and or Go. [Here]. Date published: 30 May 2020.
  • Using Splunk to Predict Health Car. [Here]. Date published: 29 May 2020.
  • k Means For Clustering in Splunk. [Here]. Date published: 29 May 2020.
  • My Top 5 Tips For New Cybersecurity Graduates Splunk and COVID 19. [Here]. Date published: 28 May 2020.
  • Introduction to Machine Learning and Splunk. [Here]. Date published: 28 May 2020.
  • Don Smith. [Here]. Date published: 28 May 2020.
  • If You re Into Cybersecurity Get Into Splunk and Machine Learning. [Here]. Date published: 25 May 2020.
  • The Beauty of Elliptic Curves Meet Twisted Edwards. [Here]. Date published: 24 May 2020.
  • Barebones P. [Here]. Date published: 24 May 2020.
  • An Uno and Golang. [Here]. Date published: 24 May 2020.
  • The private key is kept secret and never appears in the packets . [Here]. Date published: 23 May 2020.
  • The Greatest Flaw on the Internet Email . [Here]. Date published: 23 May 2020.
  • Moving the Internet to TLS 1 3 asap. [Here]. Date published: 23 May 2020.
  • In Crypto Always Run That Validation Test. [Here]. Date published: 22 May 2020.
  • Our Patent System is almost completely flawed let s demolish it . [Here]. Date published: 21 May 2020.
  • Barebones Curve 25519. [Here]. Date published: 19 May 2020.
  • What has a point x 9 and protects your security . [Here]. Date published: 18 May 2020.
  • Go And Do Crypto. [Here]. Date published: 16 May 2020.
  • I don t say it s clever or innovative I just find ECIES beautiful in its maths logic . [Here]. Date published: 14 May 2020.
  • The Chaskey Cipher The Ligher The B. [Here]. Date published: 13 May 2020.
  • Happy Bitcoin Halving Day. [Here]. Date published: 11 May 2020.
  • Bob and Alice have some trusted way of passing their public keys such as where Bob gets Alice s . [Here]. Date published: 11 May 2020.
  • NIST Recommendation for Key Management. [Here]. Date published: 10 May 2020.
  • YAK Authenticated Key Exchange. [Here]. Date published: 9 May 2020.
  • The Core of Contact Tracing App Design Who Owns Your Identity . [Here]. Date published: 9 May 2020.
  • Converting from John Napier s Logarithms to Elliptic Curve Methods. [Here]. Date published: 9 May 2020.
  • The UK Contact Tracing App Version 2 . [Here]. Date published: 7 May 2020.
  • The Implementation of the Method Used in the NHSX App. [Here]. Date published: 6 May 2020.
  • Nothing Is Every Perfect in Contract Tracing But Here s The Flaws in NHSX App. [Here]. Date published: 6 May 2020.
  • My University Went All MFA Today . [Here]. Date published: 6 May 2020.
  • The Crypto on the NHSX COVID 19 App is a Thing of Maths Beauty. [Here]. Date published: 5 May 2020.
  • But What s The Human Contract Tracer Process . [Here]. Date published: 5 May 2020.
  • OPAQUE One of the Great Advancements in Cybersecurity . [Here]. Date published: 3 May 2020.
  • The Moment I Finally Got Public Key Encryption The Inverse Mod. [Here]. Date published: 2 May 2020.
  • Fermet. [Here]. Date published: 2 May 2020.
  • Why Do We Still Pass Our Passwords Over The Network . [Here]. Date published: 1 May 2020.
  • Interviewing The World Leaders in Crypto Nick Sullivan. [Here]. Date published: 1 May 2020.
  • Golidocks and the Edwards Bears. [Here]. Date published: 1 May 2020.
  • Factoring with Elliptic Curve Methods. [Here]. Date published: 30 April 2020.
  • BanDontBlock He Shoots And Scores . [Here]. Date published: 25 April 2020.
  • Under The Hood of Zoom. [Here]. Date published: 24 April 2020.
  • Zoom Finally Takes Encryption Seriously And Goes All GCM. [Here]. Date published: 23 April 2020.
  • Is Your Computer Fan Swirring It Could Be Sending Secret Messages to Your Phone . [Here]. Date published: 23 April 2020.
  • The Risks of a Post Quantum World. [Here]. Date published: 22 April 2020.
  • Python 2 7 and Python 3 8 the Siblings That Never Got On With Each Other. [Here]. Date published: 22 April 2020.
  • Because of the Lateness in Testing Is The UK Shooting In The Dark on COVID 19 . [Here]. Date published: 20 April 2020.
  • Without Networking Meetups and Conferences High Innovation Could Crash. [Here]. Date published: 19 April 2020.
  • COVID 19 Passporting. [Here]. Date published: 18 April 2020.
  • Can You Crack The Lottery and Write Your Name in Sand . [Here]. Date published: 18 April 2020.
  • Solving Location Privacy For COVID 19 Contract Tracing With Homomorphic Encryption. [Here]. Date published: 16 April 2020.
  • Beyond Identity Secure Enclaves and Authenticating Clients Rather Than Servers. [Here]. Date published: 15 April 2020.
  • The Flawed World of Contact Tracing Where s Carol The Tester . [Here]. Date published: 14 April 2020.
  • Crypto Pairing. [Here]. Date published: 14 April 2020.
  • How Do You Prove You Know The Answer Without Revealing The Answer . [Here]. Date published: 13 April 2020.
  • My Top 10 Tips for Now . [Here]. Date published: 12 April 2020.
  • Contact Tracing The Most Amazing And Scariest Technology of The 21st Century. [Here]. Date published: 11 April 2020.
  • Python Pandas and COVID 19. [Here]. Date published: 10 April 2020.
  • Privacy In A World of Pandemics . [Here]. Date published: 9 April 2020.
  • Big Data Analysis of COVID 1. [Here]. Date published: 9 April 2020.
  • Automating Zoom with Python. [Here]. Date published: 8 April 2020.
  • You ve Heard of X25519 But What s So Special About X448 . [Here]. Date published: 7 April 2020.
  • When Is A Block Cipher Not A Block Cipher . [Here]. Date published: 6 April 2020.
  • Surely No one Uses ECB Mode in AES . [Here]. Date published: 4 April 2020.
  • A Great User Experience or Security you can have one or other . [Here]. Date published: 2 April 2020.
  • FourQ A Story of Elliptic Curves Microsoft Research and Cloudflare. [Here]. Date published: 1 April 2020.
  • Piccolo The Ultra light weight cipher. [Here]. Date published: 30 March 2020.
  • SKINNY ie Light weigh. [Here]. Date published: 29 March 2020.
  • Why Use Two Keys When You Can Have Three Meet Transform Proxy Encryption. [Here]. Date published: 28 March 2020.
  • Public Key Crypto and RFID Tags. [Here]. Date published: 28 March 2020.
  • KLEIN The Light weight crypto method that hides its operation. [Here]. Date published: 26 March 2020.
  • We MUST Become Resilant . [Here]. Date published: 19 March 2020.
  • In Memory of Horst Feiste. [Here]. Date published: 15 March 2020.
  • A New Broom Python 2 7 to Python 3 8 and a Whole Lot More . [Here]. Date published: 13 March 2020.
  • The Goldilocks Prime for Enhanced Securit. [Here]. Date published: 9 March 2020.
  • To Those Who Face A Rejection I have read with dismay your presentation Draft Ethernet . [Here]. Date published: 8 March 2020.
  • Ransomware costs an estimated 169 billion per year. [Here]. Date published: 8 March 2020.
  • Keeping Security Simple Enable MFA and Disable Old Protocols. [Here]. Date published: 7 March 2020.
  • Ring For Law Enforcement . [Here]. Date published: 7 March 2020.
  • KRACK is Back Meet Kr k . [Here]. Date published: 27 February 2020.
  • Cyber Data. [Here]. Date published: 27 February 2020.
  • The Beginning of the End for TLS 1 0 1 1 1 2. [Here]. Date published: 25 February 2020.
  • And The Internet Created TCP and It Was Bad And So Google Created QUI. [Here]. Date published: 25 February 2020.
  • Why Is The Number of Bits used in RSA So Much More Than Other Public Key Methods. [Here]. Date published: 24 February 2020.
  • The Genius of Shafrira Goldwasser. [Here]. Date published: 24 February 2020.
  • Blum Goldwasser Probalistic Encryption. [Here]. Date published: 24 February 2020.
  • Google Copied Code Line by line . [Here]. Date published: 22 February 2020.
  • Peter Montgomery RIP. [Here]. Date published: 19 February 2020.
  • Climbing Montgomery Ladder. [Here]. Date published: 19 February 2020.
  • Why Has It Taken Over 30 Years For Law Makers To Finally Wake Up To The Internet . [Here]. Date published: 15 February 2020.
  • Keyless Crypto How Do Bob Alice and Carol Share A Secret Message . [Here]. Date published: 15 February 2020.
  • For Security Bluethooth is often not good. [Here]. Date published: 15 February 2020.
  • Ding ding It s secp256k1 and Curve 25519 in Red Corner and NIST in the Blue Corner. [Here]. Date published: 10 February 2020.
  • Letting Go Of The Mersenne Twister. [Here]. Date published: 8 February 2020.
  • Facebook Workplace good or bad . [Here]. Date published: 1 February 2020.
  • Encrypted Backups The Backdoor Into Your Life or a User Disaster in the Making . [Here]. Date published: 1 February 2020.
  • Creation of The Internet Widely Regarded as a Bad Move . [Here]. Date published: 1 February 2020.
  • Did you say your name is GHOSH . [Here]. Date published: 30 January 2020.
  • What s So Special About PKCS 1 v1 5 And The Attack That Just Won t Go Away . [Here]. Date published: 29 January 2020.
  • Passwords Are Finished Say Hello To Passphrases A Story of An Elm Tree and A Bonnet. [Here]. Date published: 29 January 2020.
  • The Beauty of Finding Prime Numbers. [Here]. Date published: 28 January 2020.
  • Rebuilding A Flawed Data World with Zero Knowledge. [Here]. Date published: 19 January 2020.
  • Rusty Bullets Protect Your Data . [Here]. Date published: 18 January 2020.
  • A Ribbon A Cipher Message and a Cylinder Scytale. [Here]. Date published: 16 January 2020.
  • How The NSA Published Vulnerability Might Work . [Here]. Date published: 15 January 2020.
  • Rust and RSA. [Here]. Date published: 13 January 2020.
  • BLAKE3. [Here]. Date published: 10 January 2020.
  • Travelex is a Lesson For All The Industry Minimise Surface Area Patch and Backup. [Here]. Date published: 6 January 2020.
  • PKI Crumbles A Bit More. [Here]. Date published: 5 January 2020.
  • Lenstra s Elliptic Curve Factorization Method. [Here]. Date published: 3 January 2020.
  • The Beauty of Elliptic Curves A Real life Example of an Isogeny. [Here]. Date published: 2 January 2020.
  • 2020 New Year Coding Puzzler The Curse of the Pointer. [Here]. Date published: 2 January 2020.
  • The Evolution of Diffie Hellman Hard Problems. [Here]. Date published: 1 January 2020.
  • A New Year Cipher . [Here]. Date published: 1 January 2020.
  • My Top 10 Stories From 2019. [Here]. Date published: 31 December 2019.
  • JP Fighting Snake Oil and Analysing Security v Performance Analysed Attacked Wounded and . [Here]. Date published: 31 December 2019.
  • From Kangaroos to KitTens. [Here]. Date published: 31 December 2019.
  • Supersingular Isogeny Diffie Hellman SIDH key exchange. [Here]. Date published: 30 December 2019.
  • So What is An Isogeny . [Here]. Date published: 29 December 2019.
  • My Top 10 Predictions for the Next Decade The True Arrival of Big Brother or a Brave New Digital . [Here]. Date published: 29 December 2019.
  • Cracking Elliptic Curves with the MOV Attack. [Here]. Date published: 29 December 2019.
  • Go And Open The Box. [Here]. Date published: 28 December 2019.
  • Fake Digital . [Here]. Date published: 28 December 2019.
  • The Fractional Cipher. [Here]. Date published: 27 December 2019.
  • My Top 10 Things To Learn in 2020. [Here]. Date published: 27 December 2019.
  • Filling in The Details of Vitalic s Excellent zk SNARKs Article For QAP Processing. [Here]. Date published: 26 December 2019.
  • Processing Fit for 2020 and Not the 1980s. [Here]. Date published: 24 December 2019.
  • Goodbye To A Wonderful 2019. [Here]. Date published: 22 December 2019.
  • Go And Do Security Access Control Properly. [Here]. Date published: 22 December 2019.
  • How Does Oscar Investigate Mallory With Peggy Finding Out He Is A Suspect . [Here]. Date published: 21 December 2019.
  • MIRACL Pairing. [Here]. Date published: 19 December 2019.
  • Go Crack This Christmas Ciphe. [Here]. Date published: 18 December 2019.
  • Encrypted Keyword Searches Crypto Pairing and MIRACL. [Here]. Date published: 18 December 2019.
  • How Does Bob Encrypt Data For Alice Using Just Her Email Address . [Here]. Date published: 17 December 2019.
  • Critical Level Bugs Reported for Control Systems. [Here]. Date published: 15 December 2019.
  • Our Old Ways of Teaching Coding at School Are At An End Meet The New Way Forward . [Here]. Date published: 14 December 2019.
  • How Do You Prove You Know The Answer Without Revealing The Answer . [Here]. Date published: 14 December 2019.
  • For Privacy Hunt The zk Snark. [Here]. Date published: 14 December 2019.
  • Nigel s Vision Authenticated Key Exchange With Identity Based Encryption. [Here]. Date published: 13 December 2019.
  • Chen s Enhanced Identity based authenticated key agreement. [Here]. Date published: 13 December 2019.
  • How Does Bob Share A Secret With Alice Without Ever Communicating With Her Before The Share . [Here]. Date published: 12 December 2019.
  • How Do I Reveal How I Voted But Still Keep My Vote Secret . [Here]. Date published: 10 December 2019.
  • Amazon Alexa Health Is Right for the Citizen s Health. [Here]. Date published: 10 December 2019.
  • 9 069 000 is the Magic Number . [Here]. Date published: 9 December 2019.
  • The MIRACL of IBE Signatures. [Here]. Date published: 8 December 2019.
  • WhatsApp From FACEBOOK . [Here]. Date published: 7 December 2019.
  • RSA and Discrete Logs Crumble A Bit More. [Here]. Date published: 7 December 2019.
  • Machine Learning is Mainly Not Data Science . [Here]. Date published: 7 December 2019.
  • CL MIRACL Magic . [Here]. Date published: 6 December 2019.
  • Where Would You Find Elf in Cybersecurity . [Here]. Date published: 3 December 2019.
  • How Do I Send You a Christmas Present And Know You Won t Open It Until Christmas Day . [Here]. Date published: 3 December 2019.
  • Ho Ho Ho the Geekiest Christmas Cipher Quiz Ever . [Here]. Date published: 3 December 2019.
  • We Need To Get Better At Security . [Here]. Date published: 30 November 2019.
  • John Napier s Signature in 12 lines of Python. [Here]. Date published: 30 November 2019.
  • Devs and Time Clock Rollovers. [Here]. Date published: 30 November 2019.
  • RSA Digital Signatures in 12 Lines of Python. [Here]. Date published: 29 November 2019.
  • Congruential public key. [Here]. Date published: 26 November 2019.
  • Our World Is Made More Beautiful By Harmonics and Python . [Here]. Date published: 24 November 2019.
  • It All Comes Down To 1 s and 0 s In The End. [Here]. Date published: 24 November 2019.
  • Randomizing Your Signatures. [Here]. Date published: 17 November 2019.
  • PS Signatures with MIRACL. [Here]. Date published: 16 November 2019.
  • The Battle for Java And It Could Setup The Future of Software. [Here]. Date published: 15 November 2019.
  • BBS The Short And Anonymised Group Signature. [Here]. Date published: 15 November 2019.
  • Why Can t I Use My ID As My Public Key . [Here]. Date published: 10 November 2019.
  • Privacy Preserving Voting With the Help of John Napier s Logs. [Here]. Date published: 10 November 2019.
  • Perhaps Don t Trust Your Doorbell . [Here]. Date published: 9 November 2019.
  • Crypto Pairing By Example. [Here]. Date published: 9 November 2019.
  • A Digit Expo In My Home City. [Here]. Date published: 9 November 2019.
  • When Bob Met Alice Who Met Carol. [Here]. Date published: 8 November 2019.
  • Governments Move Into the 21st Century Kinda . [Here]. Date published: 7 November 2019.
  • AWS Goes SIKE and Thinks BIKE. [Here]. Date published: 6 November 2019.
  • Light commands for Alexa Siri and Google Home. [Here]. Date published: 4 November 2019.
  • Digital Evidence in the 21st Century . [Here]. Date published: 2 November 2019.
  • Blocks To Go. [Here]. Date published: 2 November 2019.
  • Privacy or a Better Service . [Here]. Date published: 30 October 2019.
  • Meep Meep ACME Comes To The Rescue of Cybersecurity. [Here]. Date published: 27 October 2019.
  • Investigating Cybercrime Not . [Here]. Date published: 27 October 2019.
  • Cyber Warfare Targets Energy And Nations Could Be Destroyed in Days. [Here]. Date published: 26 October 2019.
  • Basically IoT Bluetooth Security is Rubbish . [Here]. Date published: 25 October 2019.
  • The Miracl e of Crypto Pairing. [Here]. Date published: 24 October 2019.
  • On an Edinburgh Bus A root certificate a weak key and SHA 1. [Here]. Date published: 24 October 2019.
  • How To Prove An Election. [Here]. Date published: 24 October 2019.
  • Cracking The Chinese Python Way. [Here]. Date published: 22 October 2019.
  • From the Beauty of Stockholm to the Beauty of RSA. [Here]. Date published: 20 October 2019.
  • When Peggy Met Victor. [Here]. Date published: 19 October 2019.
  • Rijndael v Serpent. [Here]. Date published: 13 October 2019.
  • Similarity Matters . [Here]. Date published: 12 October 2019.
  • iPad IOS Great Catalina Bad . [Here]. Date published: 12 October 2019.
  • When Brute Force Doesn t Work Try Hobbies . [Here]. Date published: 9 October 2019.
  • How Does Mallory Pass Encrypted Data Without Bob Detecting It . [Here]. Date published: 9 October 2019.
  • Before Elliptic Curve Became King of the Hill Cramer Shoup Looked Like a Winner. [Here]. Date published: 9 October 2019.
  • Cracking RSA. [Here]. Date published: 8 October 2019.
  • Making a Ring. [Here]. Date published: 6 October 2019.
  • Google Takes Another Step Forward in Cleaning Up The Security of the Interne. [Here]. Date published: 5 October 2019.
  • ScamAware Beware Be Cautious and Don t Let the Scammers Win . [Here]. Date published: 5 October 2019.
  • The AMSO Cipher. [Here]. Date published: 4 October 2019.
  • Here comes the Dutch Cyber Police And It s a Bad Day for Botnets. [Here]. Date published: 3 October 2019.
  • I Ciphers. [Here]. Date published: 24 September 2019.
  • Want To Test A Test No one Has Ever Taken or Every Will Again . [Here]. Date published: 23 September 2019.
  • Splunking Your Password Is Splunk Safe for Passwords . [Here]. Date published: 22 September 2019.
  • RSA Cracking Claims . [Here]. Date published: 21 September 2019.
  • Post quantum Signature Bliss. [Here]. Date published: 21 September 2019.
  • I must learn lattice crypto. [Here]. Date published: 20 September 2019.
  • The Beauty of Cybersecurity and a Post Quantum World A World of Lattices Rings and Errors. [Here]. Date published: 15 September 2019.
  • How Can I Have a 1 000 Private Keys But Just One Public Key Well That s Merkle Magic. [Here]. Date published: 14 September 2019.
  • Cntrl C Interrupt and Cntl Alt Del. [Here]. Date published: 11 September 2019.
  • Money Under The Mattress . [Here]. Date published: 10 September 2019.
  • Identity Blockchain and Cryptograph. [Here]. Date published: 9 September 2019.
  • Bob Alice an iPadOS and the Apple Pencil. [Here]. Date published: 7 September 2019.
  • Factorizing Integers with the Rho Method. [Here]. Date published: 1 September 2019.
  • How Does Trent Send a Cipher Message to Bob Alice and Carol And Not Know What Reads the Message . [Here]. Date published: 31 August 2019.
  • Happy Birthday Linux. [Here]. Date published: 30 August 2019.
  • Hey Could You Transfer Two Billion Dollars For Me . [Here]. Date published: 29 August 2019.
  • Don t Mix Up SHA 1 Hashed Passwords with SHA 1 Signed Certificates. [Here]. Date published: 28 August 2019.
  • How Do I Find Out The Difference in Age Between Bob and Alice Without Revealing Their Ages. [Here]. Date published: 27 August 2019.
  • Eve The Magician Breaks The Most Secure Encryption on The Planet 256 bit AES. [Here]. Date published: 27 August 2019.
  • In Post Quantum Crypto What Is X Xn 1 . [Here]. Date published: 25 August 2019.
  • Confuscating Bitcoins . [Here]. Date published: 25 August 2019.
  • HEAAN Homomorphic Encryption for Arithmetic of Approximate Numbers CKKS. [Here]. Date published: 24 August 2019.
  • For The Love of Big Data Threat Schema and Directed Graphs in Cybersecurity. [Here]. Date published: 24 August 2019.
  • There s No Money To Be Made in Security . [Here]. Date published: 21 August 2019.
  • Please Stop Saying that it is a Million to one . [Here]. Date published: 20 August 2019.
  • How Does Bob The Taxgather Find Out Total Profits Without Revealing Any of Them . [Here]. Date published: 20 August 2019.
  • Alice Does a Secure Lucky Di. [Here]. Date published: 20 August 2019.
  • Why Do We Still Give Away Our Secret. [Here]. Date published: 18 August 2019.
  • So What s The Difference Between Interactive ZKP and Non interactive ZKP . [Here]. Date published: 18 August 2019.
  • The Most Amazing Machine on the Planet Isn t a Machine. [Here]. Date published: 17 August 2019.
  • Summarizing The Internet. [Here]. Date published: 14 August 2019.
  • The Wizardry of Elliptic Curve Cryptography. [Here]. Date published: 13 August 2019.
  • Hello To Ardama. [Here]. Date published: 13 August 2019.
  • At the Core of Cybersecurity are Risks Costs Benefits and Threat Models. [Here]. Date published: 13 August 2019.
  • Alice Bob Carol Dave and Eve Play Mental Poker in Go. [Here]. Date published: 11 August 2019.
  • We Need To Dump Our Role based Security World . [Here]. Date published: 10 August 2019.
  • Towards AGI and the continued dominance of Google . [Here]. Date published: 10 August 2019.
  • One of the greatest contributions to computer security Adding Points on an Elliptic Curve. [Here]. Date published: 10 August 2019.
  • Discovering ChaCha20 Keys and Salt in SSL TLS Connections. [Here]. Date published: 10 August 2019.
  • The Crazy World of Crypto. [Here]. Date published: 9 August 2019.
  • Me and Golang For Cybersecurity The Gopher is Nearly Perfect . [Here]. Date published: 8 August 2019.
  • Format Preserving Encryption with Go. [Here]. Date published: 8 August 2019.
  • Computer Science Crashes. [Here]. Date published: 7 August 2019.
  • Base64 Magic . [Here]. Date published: 5 August 2019.
  • Proper Tokenization and Encryption Would Have Saved Capital One From A Billion Dollar Loss. [Here]. Date published: 3 August 2019.
  • How To Bob and Alice and Carol Add Their Encryption Keys To Data . [Here]. Date published: 3 August 2019.
  • In a GDPR Era How Do I Book a Seat at the Edinburgh Festival Without Revealing My Seat Number . [Here]. Date published: 2 August 2019.
  • Bob and Alice Play Mental Poker In a World Where They Trust No one. [Here]. Date published: 2 August 2019.
  • And Where Does Your Company Do Its Market Cyber Brand Analysis . [Here]. Date published: 1 August 2019.
  • The Cyber 1. [Here]. Date published: 31 July 2019.
  • So What s 169 254 169 254 . [Here]. Date published: 31 July 2019.
  • Fiat Cryptography The software that checks itself. [Here]. Date published: 31 July 2019.
  • Remember The Days of EnCase Now It s All About Cloud Buckets Social Media and Slack . [Here]. Date published: 30 July 2019.
  • Producing an AES Cipher To Match OpenSSL in C . [Here]. Date published: 29 July 2019.
  • Meet Comrade Bob and Comrade Alice The Socialist Millionaire Who Don t Trust Anyone . [Here]. Date published: 28 July 2019.
  • The Millionaire s Problem. [Here]. Date published: 27 July 2019.
  • For Every Faceless Company There s a Mighty Tesla. [Here]. Date published: 27 July 2019.
  • Never Use M e for Ciphers. [Here]. Date published: 26 July 2019.
  • Side Channels and the Montgomery Reduction Algorithm with Golang. [Here]. Date published: 25 July 2019.
  • How Do I Calculate 5 in eight easy steps Ask the Gopher . [Here]. Date published: 25 July 2019.
  • When Peggy Met Victor in Go. [Here]. Date published: 24 July 2019.
  • A Lifetime Dedicated To Citizen s Rights To Privacy Daniel J Bernstein. [Here]. Date published: 24 July 2019.
  • Go And ChaC. [Here]. Date published: 22 July 2019.
  • Cyber Harm and Who Would Want to Be A CSO CIO . [Here]. Date published: 22 July 2019.
  • When It Come Down To It Cybersecurity Is All About Understanding Risk. [Here]. Date published: 21 July 2019.
  • What s the difference between A and a 1. [Here]. Date published: 21 July 2019.
  • We are Fake Digital. [Here]. Date published: 21 July 2019.
  • The Perfect Cybersecurity System is The Human Body. [Here]. Date published: 21 July 2019.
  • If you re a scammer don t call a Security Prof on a Saturday morning . [Here]. Date published: 21 July 2019.
  • Forget that old maths Modulo 2 is coming to town. [Here]. Date published: 21 July 2019.
  • Go and Link Some Ring Signature. [Here]. Date published: 20 July 2019.
  • Go And Do Ring Signatures Preserving Privacy. [Here]. Date published: 19 July 2019.
  • Go Public and Symmetric Key The Best of Both Worlds ECIES. [Here]. Date published: 17 July 2019.
  • Goodbye to the Creator of the Password And Also Goodbye to Passwords . [Here]. Date published: 16 July 2019.
  • ElGamal and Elliptic Curve Cryptography ECC . [Here]. Date published: 14 July 2019.
  • Cybersecurity Magic t n Threshold Signatures with BLS. [Here]. Date published: 14 July 2019.
  • Towards The Cognitive Engine in Cybersecurity. [Here]. Date published: 13 July 2019.
  • The Power of Go and the Threat of Ransomware Meet eCh0raix. [Here]. Date published: 12 July 2019.
  • The Risks of a Hack Back World Cyberware. [Here]. Date published: 11 July 2019.
  • For The Love of Ciphers Four squar. [Here]. Date published: 11 July 2019.
  • For the Love of Ciphers Cracking the S Box . [Here]. Date published: 11 July 2019.
  • For The Love of Ciphers A Hop A Skip and A Jump. [Here]. Date published: 11 July 2019.
  • The Greatest Flaw In The Internet DNS. [Here]. Date published: 10 July 2019.
  • Our Greatest Threat to the Internet Electrical Powe. [Here]. Date published: 10 July 2019.
  • Tape Up Your Camera Now . [Here]. Date published: 9 July 2019.
  • It is time for us to demand change . [Here]. Date published: 9 July 2019.
  • Meet Bob Alice and Grace The Ghost in the Machine. [Here]. Date published: 8 July 2019.
  • And Investment Security Analytics Just Increased a Bit More . [Here]. Date published: 8 July 2019.
  • Psalm 46 and Shakespeare. [Here]. Date published: 7 July 2019.
  • The Monk s Cipher. [Here]. Date published: 6 July 2019.
  • Ciphers and Matrices The Hill Cipher. [Here]. Date published: 6 July 2019.
  • ROC ing The Data Science of Cyber Security. [Here]. Date published: 3 July 2019.
  • For The Love of Network Protocols and The Command Line. [Here]. Date published: 2 July 2019.
  • W OTS s The Problem Sleepwalking Into a Broken World of Trust. [Here]. Date published: 1 July 2019.
  • Merkle Helps Rebuild Our World of Trust Again . [Here]. Date published: 1 July 2019.
  • Lamport Signatures for a Post Quantum Computing World. [Here]. Date published: 1 July 2019.
  • BiBa One Time Signature. [Here]. Date published: 30 June 2019.
  • A Fairground Problem BiBa. [Here]. Date published: 30 June 2019.
  • Rju Tsq Sz Koxjuhm The Multiplication Cipher. [Here]. Date published: 29 June 2019.
  • Never Stop Questioning This World It is Completely Amazing and Completely Flawed . [Here]. Date published: 29 June 2019.
  • Go And Find Gold Bug. [Here]. Date published: 28 June 2019.
  • The End of a Chapter and the Start of Another the PhD. [Here]. Date published: 26 June 2019.
  • Goodbye and Good Riddance To ISDN. [Here]. Date published: 26 June 2019.
  • The Rebuilding Needs To Happen Now We Must Innovate and Transform Like Never Befor. [Here]. Date published: 24 June 2019.
  • Go and CIRCL e The World. [Here]. Date published: 24 June 2019.
  • An Open Letter to UK Banks. [Here]. Date published: 23 June 2019.
  • Go Get Ready for the Post Quantum Age with a CIRCL and Supersingular Isogeny Diffie Hellman . [Here]. Date published: 23 June 2019.
  • Meet The New Global Superpower The Libra Association. [Here]. Date published: 22 June 2019.
  • Co founder of Ethereum to Present at Blockchain Identity and Cryptography Conference. [Here]. Date published: 22 June 2019.
  • The Cyber Revolution and 2nd International Conference on Blockchain and Cryptography. [Here]. Date published: 21 June 2019.
  • The Fall of Trust and the Rise of Silicon Valley . [Here]. Date published: 20 June 2019.
  • The Backdoor in your Living Room. [Here]. Date published: 18 June 2019.
  • Alice Whispers To Bob At the core of privacy in the 21st Century is Extended Triple . [Here]. Date published: 16 June 2019.
  • In 2020 Get Ready for Day 0 of the World of Tokenization. [Here]. Date published: 15 June 2019.
  • Forget AES and ChaCha20 Here s Encryption Hashing and Integrity With a Sponge. [Here]. Date published: 15 June 2019.
  • SHAKE Stirs up Crypto. [Here]. Date published: 13 June 2019.
  • One of the greatest advancements in Cybersecurity The Sponge Function Keccak and SHAKE . [Here]. Date published: 13 June 2019.
  • Multi bit public key encryption with Learning With Errors LWE . [Here]. Date published: 13 June 2019.
  • Frame Feng Shui Hammering Memory and RAMBleed. [Here]. Date published: 12 June 2019.
  • Eve The Magician Does A Quantum Robust Trick Learning With Errors. [Here]. Date published: 12 June 2019.
  • How Many Kangaroos Twelve . [Here]. Date published: 11 June 2019.
  • IoT Goes to the Disco. [Here]. Date published: 10 June 2019.
  • Big Data in Cyber Security . [Here]. Date published: 10 June 2019.
  • Who Needs a Tweak Meet Full Disk Encryption. [Here]. Date published: 9 June 2019.
  • Cipher Cracking for Cybersecurity. [Here]. Date published: 8 June 2019.
  • When Bob Bought Some Vouchers For Carol Trent and Faith. [Here]. Date published: 7 June 2019.
  • So Who Needs a GUI in Cybersecurity . [Here]. Date published: 7 June 2019.
  • In 1991 Phil Showed Us the Right Way To Send Mail In 2019 We Are Still Stuck in the 1980s with . [Here]. Date published: 6 June 2019.
  • Big Data in Cyber Security. [Here]. Date published: 5 June 2019.
  • The Magic Of Bulletproofs. [Here]. Date published: 3 June 2019.
  • What s Waldo Got To Do With Your Password . [Here]. Date published: 1 June 2019.
  • We Can t Even Do The Simple Things in Healthcare and Blockchain. [Here]. Date published: 1 June 2019.
  • Voting For The 21st Centur. [Here]. Date published: 29 May 2019.
  • Go Go and Go. [Here]. Date published: 29 May 2019.
  • On EU Voting Day Privacy Preserving Voting. [Here]. Date published: 27 May 2019.
  • In 40 years email is still the weakest link in security so how can we stop email snooping . [Here]. Date published: 26 May 2019.
  • Homomorphic Encryption using ElGamal Encryptio. [Here]. Date published: 26 May 2019.
  • As Some Politicians May Want To Tear Us Apart Science and Technology Must Strive To Rebuild. [Here]. Date published: 26 May 2019.
  • John Napier s Legacy Lives on in the 21st Century within ElGamal Encryptio. [Here]. Date published: 25 May 2019.
  • Meet The Greatest Threat To The Global Banking Industry Facebook GlobalCoin. [Here]. Date published: 24 May 2019.
  • Homomophic Encryption and Unlinkable PseudoID in 12 Lines of Python. [Here]. Date published: 22 May 2019.
  • From Little Acorns Do Might Oaks Grow The Data Science of Cyber Security. [Here]. Date published: 22 May 2019.
  • RSA in 12 lines of Python. [Here]. Date published: 20 May 2019.
  • Privacy is an inherent human right Come Hear From Bruce Schneier. [Here]. Date published: 20 May 2019.
  • Meet Android Version 2 . [Here]. Date published: 20 May 2019.
  • There s a big difference between knowing the name of something and knowing somethin. [Here]. Date published: 19 May 2019.
  • The Wonderful Mind of Michael O Rabin. [Here]. Date published: 19 May 2019.
  • Go Exercise Your Brain . [Here]. Date published: 19 May 2019.
  • Okamoto Uchiyama Crypto. [Here]. Date published: 18 May 2019.
  • Just Another Patch Tuesday NCSC Stops Another WannaCry Adobe Hits 83 and WhatsApp Hits Zero. [Here]. Date published: 18 May 2019.
  • Building A Future Health Care System For The Instance Auditing of Spend. [Here]. Date published: 18 May 2019.
  • The Not So Wonderful World of Bluetooth Security A One Byte Encryption Key . [Here]. Date published: 17 May 2019.
  • Robert J McEliece RIP Who Laid Down The Foundations Of A Quantum Robust Future. [Here]. Date published: 17 May 2019.
  • It s medieval witchcraft it s genuinely medieval witchcraf. [Here]. Date published: 17 May 2019.
  • Using The Cloud For Educatio. [Here]. Date published: 16 May 2019.
  • Reshaping Our World with a More Trustworthy Energy Infrastructure and In Creating New Economies. [Here]. Date published: 15 May 2019.
  • A Major Backdoor in WhatsApp . [Here]. Date published: 14 May 2019.
  • Picking a Base Point in ECC. [Here]. Date published: 13 May 2019.
  • In ECC If We Add Two Points on the Curve We Always Get Another Point on the Curve. [Here]. Date published: 12 May 2019.
  • Adding Points in Elliptic Curve Cryptography. [Here]. Date published: 12 May 2019.
  • When Mathematical Beauty Protects On line Security and Identity Point Addition In ECC. [Here]. Date published: 11 May 2019.
  • Multi factor Authenication MUST become a de facto standard on corporate systems. [Here]. Date published: 11 May 2019.
  • Cyber Kiosks The Data Harvesting Booth or Protecting Society . [Here]. Date published: 11 May 2019.
  • We Need Regulation and SAFU for Every Company who Trades Cryptocurrency. [Here]. Date published: 9 May 2019.
  • Go on Choose Cyber Edinburgh and Making an Impact. [Here]. Date published: 8 May 2019.
  • RSA 2K You Will Have a Big Electricity Bill To Crack That One . [Here]. Date published: 7 May 2019.
  • A Practical Introduction to Blockchain. [Here]. Date published: 7 May 2019.
  • What Protects Your Privacy Like No Other Method AES. [Here]. Date published: 6 May 2019.
  • How Do I Calculate 5 in eight easy steps . [Here]. Date published: 6 May 2019.
  • Hacking Your Lights. [Here]. Date published: 6 May 2019.
  • Do You Think You Can Analyse Ransomware . [Here]. Date published: 6 May 2019.
  • So How Many Bits Does The Prime Number Have . [Here]. Date published: 5 May 2019.
  • Nearly 2020 And Still No Digital Citizen ID System . [Here]. Date published: 4 May 2019.
  • Moving Target Defence Security Resilience and Obfuscation. [Here]. Date published: 4 May 2019.
  • Have a read up on https medium com billatnapier harry potter mimblewimble and invisibility cloak. [Here]. Date published: 4 May 2019.
  • You can t mathematically operate on a hash value as it only checks that one commitment . [Here]. Date published: 3 May 2019.
  • So who invented public key encryption. [Here]. Date published: 3 May 2019.
  • Eve Does Some Magic with Nothing Up Her Sleeve. [Here]. Date published: 3 May 2019.
  • Well Done British Columbia Where Innovation Thrives. [Here]. Date published: 2 May 2019.
  • Go Solve Some Puzzles . [Here]. Date published: 1 May 2019.
  • Doo Wop Diddi diddi Blum Blum Shub. [Here]. Date published: 30 April 2019.
  • Under the Hood ECC. [Here]. Date published: 28 April 2019.
  • If We Were To Create the Internet again it would be Tor based. [Here]. Date published: 28 April 2019.
  • Glasgow And The Onset of Big Brother . [Here]. Date published: 28 April 2019.
  • EverCrypt Snake oil or a major break through in Computer Security Provable safe code . [Here]. Date published: 28 April 2019.
  • Meet Facebook Living Room and Facebook Town Square . [Here]. Date published: 27 April 2019.
  • Go Learn Some Snort aka learning network protocols and how networks work . [Here]. Date published: 27 April 2019.
  • Our Wonderful Brain and a Taste of Cyber. [Here]. Date published: 26 April 2019.
  • How To Make A Million in Cryptocurrency. [Here]. Date published: 25 April 2019.
  • Building a New World At Scale Innovation Knowledge and Skills. [Here]. Date published: 24 April 2019.
  • Less Boundary Spanners and Individual Innovators and More Architecture . [Here]. Date published: 23 April 2019.
  • ElGamal Encryption. [Here]. Date published: 23 April 2019.
  • Crypto Can Be Cracked Through Wall. [Here]. Date published: 22 April 2019.
  • Assange Snowden and the Trap Door. [Here]. Date published: 22 April 2019.
  • Can We Have Core Principles for Scottish e Government and e Health. [Here]. Date published: 21 April 2019.
  • After 41 years Bob and Alice are still going strong. [Here]. Date published: 21 April 2019.
  • WPA 3 Dragonfly Out of the Frying Pan and into the Fire. [Here]. Date published: 20 April 2019.
  • To A Life Dedicated To Anonymity . [Here]. Date published: 20 April 2019.
  • The Wall of Entropy Making Cyber Security Fun . [Here]. Date published: 20 April 2019.
  • Eve does a BitCoin Sting. [Here]. Date published: 20 April 2019.
  • Could Your Car Become A Great Data Miner and Discovery New Frontiers of Data . [Here]. Date published: 20 April 2019.
  • The Debate Has Started Proof of Age and or Proof of Identity . [Here]. Date published: 18 April 2019.
  • Edinburgh Science AI Cybersecurity and Data. [Here]. Date published: 18 April 2019.
  • Rust and Go. [Here]. Date published: 17 April 2019.
  • Little Protects You On line Like ECDH Let s Go Create It . [Here]. Date published: 16 April 2019.
  • For Devs Go Seal and Open The Box. [Here]. Date published: 16 April 2019.
  • And Then There Were Four. [Here]. Date published: 16 April 2019.
  • Surely No one Uses SSL v2 0 on their Web site Yes millions still do . [Here]. Date published: 15 April 2019.
  • RSA To Go . [Here]. Date published: 15 April 2019.
  • In our Horribly Flawed World of PKI Go Schnorr. [Here]. Date published: 14 April 2019.
  • For Crypto Code Less Compile Quicker and Execute Faster. [Here]. Date published: 14 April 2019.
  • For Security How Bad are TPMs and How Good is the Apple T2 Chip. [Here]. Date published: 13 April 2019.
  • Ah Estonia already does that . [Here]. Date published: 13 April 2019.
  • Hello Alexa Can You Stop Sending My Conversations To Your Staff I am sorry Dave but I . [Here]. Date published: 13 April 2019.
  • Goodbye to the Facebook Era and Hello To The World of Privacy. [Here]. Date published: 12 April 2019.
  • So What Was The Problem With The Estonian ID System and TPMs . [Here]. Date published: 11 April 2019.
  • Do You Trust The Government To Link Your Data Across Its Systems Demand UN Linkable IDs . [Here]. Date published: 11 April 2019.
  • Ring Learning With Errors for Key Exchange RLWE KEX . [Here]. Date published: 7 April 2019.
  • Public Key Encryption with Learning With Errors LWE. [Here]. Date published: 7 April 2019.
  • Learning With Errors LWE and Ring LWE. [Here]. Date published: 7 April 2019.
  • Homomorphic Encryption with Learning With Errors LWE . [Here]. Date published: 7 April 2019.
  • The Wonderful and not so Wonderful World of Tokens. [Here]. Date published: 6 April 2019.
  • John s Napier s Legacy Lives On . [Here]. Date published: 6 April 2019.
  • Data Processing Becomes Anonymised. [Here]. Date published: 6 April 2019.
  • Forget the Hype and See the Sheer Beauty of Blockchain Merkle Trees Schnorr Signatures Fiat . [Here]. Date published: 4 April 2019.
  • Transparency and Audibility along with Pseudo anonymity Are Key To A Trusted World. [Here]. Date published: 3 April 2019.
  • The Secret Is Out Great Researchers Don t Necessarily Make The Best Teachers and Vice Versa . [Here]. Date published: 1 April 2019.
  • So What Do Sea Shells Have To Do With Computer Security . [Here]. Date published: 1 April 2019.
  • So Much For Encrypted Apps . [Here]. Date published: 1 April 2019.
  • Piger Fabrica Syndrome Hits Device. [Here]. Date published: 1 April 2019.
  • Is There A Formula For Writing a Research Paper . [Here]. Date published: 1 April 2019.
  • How Can I Send You Your Birthday Present and Know That You Won t Open it until your Birthday . [Here]. Date published: 1 April 2019.
  • From Startup To World Leading Microsoft Github. [Here]. Date published: 1 April 2019.
  • For The Love of LinkedIn. [Here]. Date published: 1 April 2019.
  • My Tip To Early Career Researchers Teach Well Take Risks and Love What You Do. [Here]. Date published: 31 March 2019.
  • Hidden Markov Model For Insider Threat Detection. [Here]. Date published: 31 March 2019.
  • Delegation Exists in The Real World So Why Not In Our Digital Worlds Meet Delegated Anonymous . [Here]. Date published: 25 March 2019.
  • The Core of Digital Forensics Magic Number. [Here]. Date published: 23 March 2019.
  • More Than 8 in 10 iOS Apps Have Poor Standards of Cryptography. [Here]. Date published: 23 March 2019.
  • Facial Recognition You Cannot Hide From The Machine. [Here]. Date published: 23 March 2019.
  • Meet RepuCoin The Best Pupils Develop Their Academy Reputation Over Time. [Here]. Date published: 20 March 2019.
  • Transferring 12 5 million into your account . [Here]. Date published: 18 March 2019.
  • Wi fi Signals Can Reveal Your Password. [Here]. Date published: 17 March 2019.
  • The Wonder of Radio Waves and Yagi . [Here]. Date published: 17 March 2019.
  • The Internet is still one of the most amazing things that has ever been created. [Here]. Date published: 17 March 2019.
  • Introduction to Na ve Bayes in Cybersecurity. [Here]. Date published: 17 March 2019.
  • Whisky Glasgow and Blockchain What Could Be Better . [Here]. Date published: 14 March 2019.
  • Machine Learning Gone Bad . [Here]. Date published: 14 March 2019.
  • Building The Future In A Peer Reviewed Way. [Here]. Date published: 12 March 2019.
  • The Sorry State of Secure Software Development . [Here]. Date published: 10 March 2019.
  • The March of AI From UAVs and Automated Cars to Killer Robots. [Here]. Date published: 10 March 2019.
  • The Bank of Facebook. [Here]. Date published: 6 March 2019.
  • Pack Your Knapsack For Some Secret Messages Difficult to Pack Easy to Unpack. [Here]. Date published: 6 March 2019.
  • So what is the encryption in 3G 4G networks . [Here]. Date published: 5 March 2019.
  • TLS 1 3 starts a new road map. [Here]. Date published: 4 March 2019.
  • The Biggest Sticking Plaster in Cybersecurity SSL TLS. [Here]. Date published: 4 March 2019.
  • The Secret of Tipsy Cola is . [Here]. Date published: 3 March 2019.
  • Goodbye PKI . [Here]. Date published: 3 March 2019.
  • Creating Completely Distributed Cybersecurity Learning Goodbye Cloud Hello Kubernetes. [Here]. Date published: 3 March 2019.
  • Will A Cyber Attack Happen Why yes . [Here]. Date published: 27 February 2019.
  • Glasgow Under A Microscope. [Here]. Date published: 25 February 2019.
  • Edinburgh Under A Microscope. [Here]. Date published: 25 February 2019.
  • Go Book James Lindsay Now . [Here]. Date published: 20 February 2019.
  • Ding ding It s ECC v RSA. [Here]. Date published: 19 February 2019.
  • Why Don t You Use Public Key Encryption To Protect Your Data Sent From the Browser . [Here]. Date published: 17 February 2019.
  • Tip To Developers Avoid Using Immutable Types for Passwords and Sensitive User Data. [Here]. Date published: 17 February 2019.
  • Is Your Country Building Its Future Digital Economy on Sand or Solid Foundations . [Here]. Date published: 17 February 2019.
  • The world looks to Denmark for strong leadership in encryption. [Here]. Date published: 16 February 2019.
  • No Tracking No Comments Allowed Oh Facebook tut tut . [Here]. Date published: 16 February 2019.
  • Creating a More Enterprising Trusted and Caring World All Happening in Crypto Valley. [Here]. Date published: 15 February 2019.
  • Get Ready For a Most Secure Power Supply For Your Laptop. [Here]. Date published: 13 February 2019.
  • Wi fi Can Reveal Your PIN Number . [Here]. Date published: 11 February 2019.
  • Watch Out For Releasing Your Secrets On GitHub. [Here]. Date published: 11 February 2019.
  • SMETS 2 A Step Forward in Energy Saving or a Backdoor To Bring Down A Country . [Here]. Date published: 11 February 2019.
  • Randomization with GIMLI. [Here]. Date published: 11 February 2019.
  • Diffie Hellman with Zero Knowledge Proof. [Here]. Date published: 10 February 2019.
  • An RSA Cipher Challenge. [Here]. Date published: 10 February 2019.
  • Adiantum The New Standard For Smart Phone and Disk Encryption . [Here]. Date published: 10 February 2019.
  • A Little Cyber Puzzle . [Here]. Date published: 10 February 2019.
  • When You Are Buying A Computer Look Out For The Number of Cores. [Here]. Date published: 9 February 2019.
  • The Problem With Passwords . [Here]. Date published: 9 February 2019.
  • Health and Blockchain Today and Into The Future. [Here]. Date published: 8 February 2019.
  • One Less Reason To Use Microsoft Windows. [Here]. Date published: 6 February 2019.
  • In Our Flawed and Untrusted World Welcome to the Wonderful World of Range Proofs And Instant. [Here]. Date published: 3 February 2019.
  • Redesign the Provision of Health Care Funding For a 21st Century within a Tokenized World. [Here]. Date published: 2 February 2019.
  • Under Starters Orders The Race is on to Address One of the Greatest Challenges in Modern Computer . [Here]. Date published: 31 January 2019.
  • Thanks for spotting I have fixed that link . [Here]. Date published: 31 January 2019.
  • Pushing SWIFT into the 21st Century. [Here]. Date published: 31 January 2019.
  • Whispering In Your Ear Vote for Eve . [Here]. Date published: 30 January 2019.
  • Scanning The Dark Web. [Here]. Date published: 30 January 2019.
  • Elliptic Curve Is At The Core Of Internet Privacy and it s the Core of an Onion. [Here]. Date published: 30 January 2019.
  • Chimeras Snake Oil and Buy My Magic Amulet and You ll be Fine. [Here]. Date published: 30 January 2019.
  • When A Cybersecurity Package and Big Data Save Lives . [Here]. Date published: 29 January 2019.
  • Your On line Security Is Probably More Dependent on Prime Numbers Than Your Virus Scanner. [Here]. Date published: 27 January 2019.
  • There Is An Infinite Series But I Bet You Can t Get The Next In This Sequence 1 5 13 563 . [Here]. Date published: 27 January 2019.
  • The True Foundation of our Modern Digital World is Electrical Power. [Here]. Date published: 27 January 2019.
  • Cloud Outages Might Seem Trivial But Show That Our Data Infrastructure Is Fragile. [Here]. Date published: 27 January 2019.
  • Build The Next Generation of Cybersecurity Training and Academic Study. [Here]. Date published: 27 January 2019.
  • The Merging of our Digital World A Good Thing or a Bad Thing . [Here]. Date published: 26 January 2019.
  • Draining The Life Out of Computer Science . [Here]. Date published: 25 January 2019.
  • When is High grade Encryption Not High Grade When it s ECB . [Here]. Date published: 24 January 2019.
  • Do We Need Baseline Security for all SQL Data Stores . [Here]. Date published: 22 January 2019.
  • It could be part of it but we at least need need something where we can post our public keys in a. [Here]. Date published: 21 January 2019.
  • Towards Trustworthy Systems In the Near Future Every Piece of Code Will Be Signed By Its Creator. [Here]. Date published: 20 January 2019.
  • The Application That Made The Internet Is Now It s Greatest Flaw. [Here]. Date published: 20 January 2019.
  • Why I Do Cyber Security Research The Sheer Joy of Cracking Puzzles . [Here]. Date published: 19 January 2019.
  • Compressing Our Digital World. [Here]. Date published: 16 January 2019.
  • In The Future Banks Will Not Be Built With Bricks But On Cryptography. [Here]. Date published: 13 January 2019.
  • Visual One of the Most Beautiful Things in Cybersecurity. [Here]. Date published: 12 January 2019.
  • The Keys To Your Castle and Your Backdoor Front door and Side door. [Here]. Date published: 11 January 2019.
  • Goodbye Mostly to Moodle Hello Open And Goodbye to Closed. [Here]. Date published: 9 January 2019.
  • What s The One Thing That Most Agree Is Right In Computer Security But Few Actually Do It . [Here]. Date published: 3 January 2019.
  • Treasure Finding For Pirates Meet Witness based Encryption. [Here]. Date published: 1 January 2019.
  • Towards True Security Attribute based Encryption. [Here]. Date published: 1 January 2019.
  • Simple Examples ofPair based Cryptograph. [Here]. Date published: 31 December 2018.
  • Happy New Year A Few Memories of 2018. [Here]. Date published: 31 December 2018.
  • Let 2019 Be The Year of Anonymity and Trust Meet The Camenisch Lysyanskaya Signature. [Here]. Date published: 29 December 2018.
  • Moving Towards A Tokenized World For Access Rights. [Here]. Date published: 28 December 2018.
  • AES Is Great But We Need A Fall back Meet ChaCha and Poly1305. [Here]. Date published: 28 December 2018.
  • The Problem With GDPR Is . [Here]. Date published: 27 December 2018.
  • Bob and Alice Are Now Rich But Who Has Most Money . [Here]. Date published: 27 December 2018.
  • A Cipher Letter To Santa. [Here]. Date published: 27 December 2018.
  • The Nearest Thing To True Beauty In Cybersecurity Elliptic Curve Cryptography ECC . [Here]. Date published: 26 December 2018.
  • Thank you to Adrien Marie Legendre for his symbol. [Here]. Date published: 26 December 2018.
  • My Top 10 Things To Learn in 2019. [Here]. Date published: 26 December 2018.
  • Privacy Preserving and Trusted Votin. [Here]. Date published: 24 December 2018.
  • Matching a Value To An Elliptic Curve Point. [Here]. Date published: 24 December 2018.
  • What Makes A Good Research Paper Making A Paper Look Right Gestalt. [Here]. Date published: 23 December 2018.
  • On Our First GDPR Christmas How Do I Create Christmas Vouchers That Your Store Cannot Track . [Here]. Date published: 23 December 2018.
  • For Control of the Internet It s Bots v Humans Solving CAPTCHAs In a Crediable and Secret Way. [Here]. Date published: 23 December 2018.
  • Meet Troika A Hashing Method Fit For IoT Blockchains . [Here]. Date published: 22 December 2018.
  • Cryptomining Blockchain forks Cryptoassets Disposal of Cryptoassets and Pooling Tax Goes . [Here]. Date published: 21 December 2018.
  • Elfs Katz and the Great Zbikowski Trivial Digital Forensics Facts for Christmas. [Here]. Date published: 20 December 2018.
  • Nothing Up My Sleeve Creating A More Trust World with the Elliptic Curve Pedersen Commitment. [Here]. Date published: 19 December 2018.
  • On The Blockchain How Do I Keep Things Secret But Can Reveal The Secret To You Some time In The . [Here]. Date published: 18 December 2018.
  • How Do I Reveal To You How I Voted In An Election Without The Election Agent Revealing My Vote . [Here]. Date published: 18 December 2018.
  • Passing Encrypted Tokens The Fernet Way. [Here]. Date published: 17 December 2018.
  • Have a Very Geeky Christmas My Christmas Cipher Quiz. [Here]. Date published: 17 December 2018.
  • Our Old Road Is Rapidly Aging. [Here]. Date published: 16 December 2018.
  • Goodbye To The Man Who Predicted Our Future Tim May. [Here]. Date published: 16 December 2018.
  • When qwerty11 is a good password Meet Entropy. [Here]. Date published: 15 December 2018.
  • Sometimes we can t even get the basics of Cybersecurity correct. [Here]. Date published: 15 December 2018.
  • How Much Does It Cost To Make a Web Site These Days . [Here]. Date published: 15 December 2018.
  • Tell Your Kids Learn Python and JavaScript Use a R PI And Fire Up Linu. [Here]. Date published: 14 December 2018.
  • The Song Remains The Same A Story of Unencrypted Data A 50 year old Web infrastructure A Lack . [Here]. Date published: 11 December 2018.
  • Sometimes It Feels Like Only Cybercrimals Know How To Use Encryption Properly. [Here]. Date published: 10 December 2018.
  • It s Old World v New World . [Here]. Date published: 8 December 2018.
  • I hear my kettle boiling could you turn it off for me . [Here]. Date published: 8 December 2018.
  • Our Critical National Infrastructure Is Possibly Not A Resilient As You Might Think. [Here]. Date published: 7 December 2018.
  • Governments Wake up To Need To Build Cybersecurity Companies. [Here]. Date published: 7 December 2018.
  • Something Better Change When Does 40 Quadrillion Years Become One Day . [Here]. Date published: 4 December 2018.
  • Microsoft Goes Open Source For The Next Generation of The Internet. [Here]. Date published: 4 December 2018.
  • After Schrodinger s Cat Meet Bleichenbacher s CAT. [Here]. Date published: 3 December 2018.
  • The Song Remains The Same We Can t Confirm If The Data Was Encrypted Properly. [Here]. Date published: 1 December 2018.
  • For Cutting edge Innovation in the UK It s London That Is Out In Front. [Here]. Date published: 30 November 2018.
  • Boneh Lynn Shacham BLS signatures. [Here]. Date published: 30 November 2018.
  • Your Headphones Might Break The Security of Your Computer. [Here]. Date published: 29 November 2018.
  • Digital Is Natural In Our Lives Apart From in Health Car. [Here]. Date published: 29 November 2018.
  • Our Greatest Vulnerability For the Internet A Large Scale Compromise of Git Hub Code . [Here]. Date published: 28 November 2018.
  • Making a Dent Inspiring The Next Generation of Cybersecurity Innovators. [Here]. Date published: 26 November 2018.
  • How To Completely Audit Our Financial Infrastructure In An Instance Meet The Merkle Patricia Tree. [Here]. Date published: 25 November 2018.
  • The Wonder of Merkle Tree. [Here]. Date published: 24 November 2018.
  • So Where is Mnchen 3ya . [Here]. Date published: 24 November 2018.
  • Goodbye To Multiple Wet Signatures on Documents and Hello To A More Trusted and Verifiable World. [Here]. Date published: 21 November 2018.
  • What s Building The Future JavaScript . [Here]. Date published: 20 November 2018.
  • Can Ford Be The New Google The Race of the Data Miners To The Car. [Here]. Date published: 20 November 2018.
  • Encryption Isn t Just A Switch . [Here]. Date published: 18 November 2018.
  • If Your Want To Be Good At Cyber Security Go Learn Python and JavaScript. [Here]. Date published: 17 November 2018.
  • Helping Researchers Building A More Trusted And Security World. [Here]. Date published: 16 November 2018.
  • Not Playing Randomly The Sony PS3 and Bitcoin Crypto Hacks. [Here]. Date published: 12 November 2018.
  • Wet Signatures and the Wonderful World of Schnorr . [Here]. Date published: 8 November 2018.
  • Research Innovation and Impacts. [Here]. Date published: 8 November 2018.
  • Doing Crypto In A Browser. [Here]. Date published: 7 November 2018.
  • The Fall of TrueCrypt and Rise of VeraCrypt. [Here]. Date published: 5 November 2018.
  • Doh What My Encrypted Drive Can Be Unlocked By Anyone . [Here]. Date published: 5 November 2018.
  • As a PhD Examiner My Top 25 Tips for PhD students. [Here]. Date published: 5 November 2018.
  • The Future of Cyber Security Data and AI Big Brother or a Brave New World . [Here]. Date published: 4 November 2018.
  • Bitcoin A Model T for payments . [Here]. Date published: 4 November 2018.
  • Harry Potter MimbleWimble and Invisibility Cloaks Building a More Privacy and Scalable Data . [Here]. Date published: 3 November 2018.
  • The Next Generation of Cyber Security Training SOCLAB. [Here]. Date published: 1 November 2018.
  • In Memory of David Benyon. [Here]. Date published: 1 November 2018.
  • In Edinburgh where is the best balance of old and young and what happened to the gender balance . [Here]. Date published: 1 November 2018.
  • Dial Z for Crypto Encrypt 100 of Everything 100 of the Time. [Here]. Date published: 1 November 2018.
  • For The Love of Computing How Do We Flip A Billion Coins in a Fair Way . [Here]. Date published: 30 October 2018.
  • For The Love of Ciphers Fractionating and Transposition Ciphers The Delastelle Cipher. [Here]. Date published: 30 October 2018.
  • Is Your Country Fake Digital Or Real Digital . [Here]. Date published: 29 October 2018.
  • Towards Complete Encryption within Cloud based Systems Attributed based Encryption. [Here]. Date published: 28 October 2018.
  • Towards A Quantum World Hash to Obtain Random Subset HORS . [Here]. Date published: 28 October 2018.
  • How Do I Prove That I Am Spartacus Without Showing My ID . [Here]. Date published: 27 October 2018.
  • And Onto Another Chapter for Zonefox. [Here]. Date published: 24 October 2018.
  • If required and only for trusted entities the token can be resolved back into the banking . [Here]. Date published: 22 October 2018.
  • Your Coffee Shop Wi fi Can See What You Are Connecting To . [Here]. Date published: 21 October 2018.
  • Towards a More OPAQUE World Where Passwords or Hashed Password Are Not Stored On Servers. [Here]. Date published: 21 October 2018.
  • The UK Sits Between Two Stools and Must Pick One. [Here]. Date published: 21 October 2018.
  • Why Do We Still Pass Passwords Over a Network Meet PAKE. [Here]. Date published: 20 October 2018.
  • Building a Future Economy on Sand . [Here]. Date published: 19 October 2018.
  • True GDPR Compliance Should Focus on Full Encryption Well Done To Denmark. [Here]. Date published: 18 October 2018.
  • The Times They Are A Changin Towards the Token Economy. [Here]. Date published: 18 October 2018.
  • A Chat on Edinburgh Enterprise Cryptography and Cybersecurity. [Here]. Date published: 18 October 2018.
  • Towards a Hard Data Border in the UK. [Here]. Date published: 15 October 2018.
  • Data Security and Resilience using Secret Shares and Elliptic Curve Methods. [Here]. Date published: 14 October 2018.
  • How Do Pirates Share a Treasure Map If They Don t Trust Each Other . [Here]. Date published: 13 October 2018.
  • One of the biggest holes on the Internet has just been plugged. [Here]. Date published: 12 October 2018.
  • Which Method Has Done More To Reduce Bandwidth Data Than Any Other . [Here]. Date published: 11 October 2018.
  • Towards The Token Economy Governments Start To Adopt Blockchain Into Legal Frameworks. [Here]. Date published: 11 October 2018.
  • So What Does A Modern Encryption Key Look Like . [Here]. Date published: 11 October 2018.
  • We Are Fairly Predicable When It Comes To Passwords. [Here]. Date published: 9 October 2018.
  • The Snowden Phon. [Here]. Date published: 8 October 2018.
  • Getting Anyway from PKI and Properly Defining a Trust Infrastructure. [Here]. Date published: 7 October 2018.
  • Why Does A Scrawl Still Exist in the 21st Century . [Here]. Date published: 6 October 2018.
  • When Bob Met Alice And Carol Shared key Over Three Parties with BN curves. [Here]. Date published: 6 October 2018.
  • So What s In A Public Key . [Here]. Date published: 6 October 2018.
  • Having Fun With Crypto The Blinding Attack And The Crazy World of Wet Signatures. [Here]. Date published: 6 October 2018.
  • Can you find my Bitcoins . [Here]. Date published: 4 October 2018.
  • The Most Significant Future Risk Around Blockchain ECDSA. [Here]. Date published: 3 October 2018.
  • Standing Up For Academic Freedoms. [Here]. Date published: 3 October 2018.
  • So How Do I Divide In Crypto Space . [Here]. Date published: 3 October 2018.
  • Are you a crypto geek . [Here]. Date published: 3 October 2018.
  • Key pairing over BN curves. [Here]. Date published: 1 October 2018.
  • Education Education Education. [Here]. Date published: 30 September 2018.
  • Our Flawed World of Identity and Rights . [Here]. Date published: 29 September 2018.
  • In Memory of Stephen Pohlig. [Here]. Date published: 29 September 2018.
  • Another Loss of Customer Trust in Facebook . [Here]. Date published: 29 September 2018.
  • Robots and Random Oracles The Good and The Bad of Public Key Cryptography. [Here]. Date published: 27 September 2018.
  • Can I derive the private key from the public key. [Here]. Date published: 27 September 2018.
  • What Has A 17th Century French Friar Got To Do With Your Smart Phone Payment . [Here]. Date published: 24 September 2018.
  • The Cyclic Group G of Order p. [Here]. Date published: 24 September 2018.
  • Light weight Cryptography Triviu. [Here]. Date published: 23 September 2018.
  • Baby Step Giant Step Solving Discrete Logarithms and Why It s A Hard Problem To Solve. [Here]. Date published: 23 September 2018.
  • Which City in the World Has A New Lab With Six New PhD Students Focused On Identity Blockchain and . [Here]. Date published: 22 September 2018.
  • Cracking RSA by listening to the wires and radio wave. [Here]. Date published: 22 September 2018.
  • Get Yourself Some Whiteboard Markers You Might Just Need Them. [Here]. Date published: 16 September 2018.
  • FFX schemes for Format Preserving Encryption. [Here]. Date published: 16 September 2018.
  • SOCLAB Building The Future of Cyber Security Training and Awareness. [Here]. Date published: 15 September 2018.
  • My Top Tip for CEOs Invest in Tokenization for Now and Cryptography For the Future. [Here]. Date published: 15 September 2018.
  • 1974 and The Patent That Started Cyber Security Feistel Ciphers. [Here]. Date published: 15 September 2018.
  • The Dawn of a Major Clampdown of the Internet . [Here]. Date published: 13 September 2018.
  • The British Airways Hack JavaScript Weakness Pin pointed Through Time lining. [Here]. Date published: 12 September 2018.
  • A Rallying Cry To All CEOs You Need To Get More Technical . [Here]. Date published: 12 September 2018.
  • We build in other challenges that proves that Bob knows a registered secret which only he knows . [Here]. Date published: 11 September 2018.
  • Towards A Tokenized Data World A New World Is Being Created. [Here]. Date published: 11 September 2018.
  • We Need To Dump Our Love of Plastic. [Here]. Date published: 10 September 2018.
  • In Search of the Perfect Cybercrime . [Here]. Date published: 10 September 2018.
  • Format Preserving Encryption Why Do We Still Store Citizen IDs on Databases . [Here]. Date published: 10 September 2018.
  • Beware Large Scale Phishing Campaign for The Start of the Semester. [Here]. Date published: 10 September 2018.
  • Governments of the World Need To Stop Seeing Blockchain As a Technology And Rebuild Trust in a . [Here]. Date published: 9 September 2018.
  • Bob Bets With Alice For One Million But They Don t Trust Anyone To Toss The Coin. [Here]. Date published: 9 September 2018.
  • After BA Hack We Need To Improve Web Security. [Here]. Date published: 9 September 2018.
  • RATs And A Fun Manager in Botnets. [Here]. Date published: 8 September 2018.
  • Incident Report Guessing Chatbots the BA Hack and Ticketmaster. [Here]. Date published: 8 September 2018.
  • In The Crypto World Miners Keep Timesheets. [Here]. Date published: 8 September 2018.
  • Crashing Systems With a Font The Homograph Attac. [Here]. Date published: 8 September 2018.
  • BA Hack Shows That Our 20th Century Methods Have Produced A Fragile Digital World. [Here]. Date published: 8 September 2018.
  • A Sweet Taste for Intruders Honey Encryption. [Here]. Date published: 8 September 2018.
  • The Ease of Public Key and Power of Symmetric Key Meet Hybrid Encryption with Google Tink ECIES . [Here]. Date published: 7 September 2018.
  • Why You Still Receive Phishing Emails and Malware Scrambling The Code. [Here]. Date published: 6 September 2018.
  • Why You Still Receive Phishing Emails And Malware Mangling The Strings. [Here]. Date published: 6 September 2018.
  • Why You Still Receive Phishing Emails and Malware Crypto Tricking. [Here]. Date published: 6 September 2018.
  • Massive Cryptocurrency Flows. [Here]. Date published: 6 September 2018.
  • For The Love of Computing Matching Your Eye to Images and Video DCT and Quantizatio. [Here]. Date published: 6 September 2018.
  • Detecting Malware In Android Stores. [Here]. Date published: 6 September 2018.
  • ARIA Why Have One S Box When You Can Have Two . [Here]. Date published: 6 September 2018.
  • The Bitcoin Glitch. [Here]. Date published: 5 September 2018.
  • Homicide by a Medical Device . [Here]. Date published: 5 September 2018.
  • 20th Century Tech v A 21st Century World . [Here]. Date published: 5 September 2018.
  • How Euler Secured The World. [Here]. Date published: 4 September 2018.
  • Get Ready for the Greatest Change in Our Digital World Since the Start of the Internet Meet the . [Here]. Date published: 4 September 2018.
  • For The Building A More Trusted World Countries With Vision Win Every Time. [Here]. Date published: 4 September 2018.
  • Entropy And Randomness. [Here]. Date published: 4 September 2018.
  • Towards a Fair and Open Election. [Here]. Date published: 3 September 2018.
  • Happy 10th Birthday To The Browser Renders The Web. [Here]. Date published: 3 September 2018.
  • Proving Messages and That Bob Is Still Sending Them MAC With Google Tink. [Here]. Date published: 2 September 2018.
  • Proving Bob is Bob Using Digital Signatures With Google Tink. [Here]. Date published: 2 September 2018.
  • Cryptography With Google Tink. [Here]. Date published: 2 September 2018.
  • Which Encryption Process Encrypts on Either Side . [Here]. Date published: 1 September 2018.
  • Just A Research Project or a New Spying Network Linking Adverts To Purchases . [Here]. Date published: 1 September 2018.
  • Wi fi Wallets and JSON Tokens Fall To Hashcat 4 x. [Here]. Date published: 31 August 2018.
  • What Has A 17th Century French Friar Got To Do With Your Smart Phone Payment . [Here]. Date published: 31 August 2018.
  • RSA 4K. [Here]. Date published: 31 August 2018.
  • Printing Your Keys In a Tent. [Here]. Date published: 31 August 2018.
  • My Cat Loves Io. [Here]. Date published: 31 August 2018.
  • Giving Away Crypto Keys for 230. [Here]. Date published: 31 August 2018.
  • Getting an email from The Invisible Man We Can t Even Get The Basics Right . [Here]. Date published: 31 August 2018.
  • Ephemeral Diffie Hellman with RSA DHE RSA . [Here]. Date published: 31 August 2018.
  • When Lazy Administrators Cause A Logjam. [Here]. Date published: 30 August 2018.
  • SWIFT The Not So Secure Financial Network. [Here]. Date published: 30 August 2018.
  • Sick of Car Jams Let Crypto Car Payments Ease Your Route. [Here]. Date published: 30 August 2018.
  • SegWit Bob Alice and Trent meet Schnorr. [Here]. Date published: 30 August 2018.
  • Scamming is Serious For Businesses Meet King From Your Bank . [Here]. Date published: 30 August 2018.
  • How Guessable Is Your Password . [Here]. Date published: 30 August 2018.
  • How Do You Spot a Cyber Criminal . [Here]. Date published: 30 August 2018.
  • Goodbye OpenSSL and Hello To Google Tink. [Here]. Date published: 30 August 2018.
  • Diffie Hellman Man in the middle . [Here]. Date published: 30 August 2018.
  • Data Telling A Story of a World of Crime. [Here]. Date published: 30 August 2018.
  • Breaking The Encryption on Your Mobile Phone Without Touching It. [Here]. Date published: 30 August 2018.
  • Blowing Up A Balloon And Breaking Crypto Crackers. [Here]. Date published: 30 August 2018.
  • Why do we use Bytes . [Here]. Date published: 29 August 2018.
  • The Millionaire s Problem In A World Where Bob and Alice Trust No one. [Here]. Date published: 29 August 2018.
  • The Debate Is Over Now To Rebuild The World. [Here]. Date published: 29 August 2018.
  • Signing For A Gabled Message The Blinding attack. [Here]. Date published: 29 August 2018.
  • Meet The Wild West of Crypto Exchanges. [Here]. Date published: 29 August 2018.
  • Meet the Three headed Hell hound Kerberos. [Here]. Date published: 29 August 2018.
  • Meet Law Enforcement s New Friend Alexa. [Here]. Date published: 29 August 2018.
  • Let Me Create Your Crypto Wallet For You . [Here]. Date published: 29 August 2018.
  • For The Love of Cycling The Multiplicative group for modulo n. [Here]. Date published: 29 August 2018.
  • The 3T challenge for digital forensics Tails Telegram and Tor. [Here]. Date published: 28 August 2018.
  • Ode to RFCs and Jon Postel. [Here]. Date published: 28 August 2018.
  • In Search of the Perfect Hash. [Here]. Date published: 28 August 2018.
  • As Fast As A Rabbit Light weight Crypto For IoT. [Here]. Date published: 28 August 2018.
  • After 40 years email is finally getting changed a bit . [Here]. Date published: 28 August 2018.
  • I m uneasy about this most trendy and oversold community . [Here]. Date published: 28 August 2018.
  • Watch Those Chargers AT Public Spaces A Major Android Flaw. [Here]. Date published: 27 August 2018.
  • The Complexity of the Cyber Security Role When 52 Becomes One. [Here]. Date published: 27 August 2018.
  • Cracking RSA A Challenge Generator. [Here]. Date published: 27 August 2018.
  • Wi fi Signals Can Actual Reveal Your Password . [Here]. Date published: 26 August 2018.
  • When The NSA Made Crypto Better. [Here]. Date published: 26 August 2018.
  • The Risks of the SWIFT network. [Here]. Date published: 26 August 2018.
  • The Rainy Doll Who Advanced The Cause of Privacy More Than Anything Else in History. [Here]. Date published: 26 August 2018.
  • The Art of the Backdoor. [Here]. Date published: 26 August 2018.
  • It All Comes Down To Metal and Silicon Sometime Crypto Side Channel Attack. [Here]. Date published: 26 August 2018.
  • How Belgium and a Rainy Doll Secured The World. [Here]. Date published: 26 August 2018.
  • Causing A Ripple The Cryptocurrency Competing Against SWIFT. [Here]. Date published: 26 August 2018.
  • The Roots of Cybersecurity Owe A Great Deal to James Ellis Clifford Cocks and Malcolm Williamson. [Here]. Date published: 25 August 2018.
  • SHA 3 Keccak Gr stl Blake SHAKE and Skein The Final Versions. [Here]. Date published: 25 August 2018.
  • My Computer Science Heroes. [Here]. Date published: 25 August 2018.
  • Java A Child of Two Parents And There s a 9 Billion Custody Fight. [Here]. Date published: 25 August 2018.
  • For The Love of Computing The Lagged Fibonacci Generator Where Nature Meet Random Numbers. [Here]. Date published: 25 August 2018.
  • Crypto is SHAttered. [Here]. Date published: 25 August 2018.
  • Finding N e m o Prime Numbers. [Here]. Date published: 24 August 2018.
  • When Cracking Was Motorised. [Here]. Date published: 23 August 2018.
  • The Most Profitable Industry In The World Just Became A Little Less Profitable . [Here]. Date published: 23 August 2018.
  • Put Innovation At The Heart of Your Company Strive For A Vision and Collaborate With Those Who . [Here]. Date published: 23 August 2018.
  • If I Pick Prime Numbers For My Security How Fast Will I Find Them and How Safe Are They . [Here]. Date published: 23 August 2018.
  • Goodbye to RSA Keys Finally . [Here]. Date published: 23 August 2018.
  • For The Love of Ciphers Vigen re Cipher Cracking. [Here]. Date published: 23 August 2018.
  • For The Love of Ciphers Love and War The Nihilist Cipher. [Here]. Date published: 23 August 2018.
  • For The Love of Ciphers Fractionating and Transposition Ciphers The Delastelle Cipher. [Here]. Date published: 23 August 2018.
  • Fermat s Little Theorem Became The Core of Security on the Internet. [Here]. Date published: 23 August 2018.
  • Apache Struts 2 on the Naughty Step Again. [Here]. Date published: 23 August 2018.
  • FIXME Not A Good Idea To Do This Hunting For Bugs in Comments. [Here]. Date published: 23 August 2018.
  • When Pow Is Good. [Here]. Date published: 22 August 2018.
  • Which Company Has Been Around For Over 100 Years And Now Focuses on Cryptography . [Here]. Date published: 21 August 2018.
  • The World Has Fallen Head over Heels for Elliptic Curve Cryptography. [Here]. Date published: 21 August 2018.
  • So How Do We Anonymise Our Transactions Stealth Addresses in Blockchain. [Here]. Date published: 21 August 2018.
  • So How Do Two Banks Check Their Transfers Without An Auditor Ask Ralph . [Here]. Date published: 21 August 2018.
  • Under starter s orders it s the hash race. [Here]. Date published: 20 August 2018.
  • The Elephant in the Room Office 365 . [Here]. Date published: 20 August 2018.
  • Our pride in great SMEs step forward ECS. [Here]. Date published: 20 August 2018.
  • Linkable Ring Signatures Stealth Addresses and Mixer Contract. [Here]. Date published: 20 August 2018.
  • From Little Acorns Do Great Oaks Grow dns. [Here]. Date published: 20 August 2018.
  • The Thought Police Have Finally Arrived . [Here]. Date published: 19 August 2018.
  • The Music Cipher. [Here]. Date published: 19 August 2018.
  • The Long term Decay and Re birth of Innovation in Security and Privacy . [Here]. Date published: 19 August 2018.
  • The Guillou Quisquater GQ Identification Scheme for Zero Knowledge Proof. [Here]. Date published: 19 August 2018.
  • Quality Trumps Quantity in Research Papers . [Here]. Date published: 19 August 2018.
  • LION ATE MONK Human Readable Encryption Key. [Here]. Date published: 19 August 2018.
  • In a Post Quantum Computing World For Robust Cooking You Need a Bit of Oil and Vinegar. [Here]. Date published: 19 August 2018.
  • Goodbye to John Napier and Hello to Robert McEliece. [Here]. Date published: 19 August 2018.
  • Crypto The True Defender of Privacy or the Greatest Threat To Society . [Here]. Date published: 19 August 2018.
  • Wrong Wrong Wrong Building A Truly Citizen Focused World Where You Own Your Data. [Here]. Date published: 18 August 2018.
  • In Discrete Logs What Should g Be . [Here]. Date published: 18 August 2018.
  • Here are examples https asecuritysite com log rsa examples pdf. [Here]. Date published: 17 August 2018.
  • Who Really Needs a Wi fi Kettle . [Here]. Date published: 16 August 2018.
  • Web Security 16 million web sites are wide open to compromise . [Here]. Date published: 16 August 2018.
  • The Wonder of Bloom. [Here]. Date published: 16 August 2018.
  • Investigating Tor. [Here]. Date published: 16 August 2018.
  • Homomorphic Encryption For Division With RSA. [Here]. Date published: 16 August 2018.
  • Feige Fiat Shamir and Zero Knowledge Proof. [Here]. Date published: 16 August 2018.
  • Electronic Code Book ECB and Cipher Block Chaining CBC . [Here]. Date published: 16 August 2018.
  • Computer Science At School Continues On a Downward Track . [Here]. Date published: 16 August 2018.
  • When Peggy Met Victor It s Goodbye to an Old World of Hashed Passwords and Hello to Zero Knowledge . [Here]. Date published: 15 August 2018.
  • This Attack Has Been Around for 20 Years And It s Back Again With The Bleichenbacher Oracle . [Here]. Date published: 15 August 2018.
  • The Network is the Computer You can t hide your face from the Cloud any more. [Here]. Date published: 15 August 2018.
  • The Network is the Computer Mining Content in the Cloud. [Here]. Date published: 15 August 2018.
  • The Network Is The Computer Celebrity Spotting The Cloud becomes a bit more human . [Here]. Date published: 15 August 2018.
  • Big Brother or a Society Protecting Itself . [Here]. Date published: 15 August 2018.
  • How Do You Make A Bet So That The Bookie Can t Tell How Much You Have Won . [Here]. Date published: 14 August 2018.
  • Forward Secrecy and Ephemeral Keys Guarding Against Data Breaches in the Future and the Past. [Here]. Date published: 14 August 2018.
  • Breaching Trust Should We Switch Off Web Sites Which Gain an F Grade . [Here]. Date published: 14 August 2018.
  • So Who Wanted to Break the Internet Governments Law Enforcement and Banks . [Here]. Date published: 13 August 2018.
  • Light weight Crypto for IoT. [Here]. Date published: 13 August 2018.
  • Ding ding seconds out It s Law v Mat. [Here]. Date published: 13 August 2018.
  • Crack Light weight Crypto Just By Listening To The Power Suppl. [Here]. Date published: 13 August 2018.
  • Why The Public Sector Will Never Support Bug Bounties. [Here]. Date published: 12 August 2018.
  • When The Teaching Finishes Let The Learning Begin From Bloom s To Psychomotor. [Here]. Date published: 12 August 2018.
  • RSA Gradually Leaves The Stage After More Than 40 Years As A Leader And It s Its Friend TLS . [Here]. Date published: 12 August 2018.
  • Ring Signatures And Anonymisation. [Here]. Date published: 12 August 2018.
  • Keys Under The Mat NOBUS Key Escrow or a Crumple Zone . [Here]. Date published: 12 August 2018.
  • Doing is Learning and Learning is Doing Some Cybersecurity Brain Food . [Here]. Date published: 12 August 2018.
  • So What Have Prime Numbers and Galois Fields To Do With Your Privacy . [Here]. Date published: 11 August 2018.
  • How Do You Upgrade a Speeding Car Engine to Run 10 Times Faster Meet Sharding and Caspe. [Here]. Date published: 11 August 2018.
  • How A Dragonfly Aims To Fix Delicate Wi Fi s Wings. [Here]. Date published: 11 August 2018.
  • Finding Similarities. [Here]. Date published: 11 August 2018.
  • Where Power and Data Meet A Happy or an Unhappy Marriage. [Here]. Date published: 10 August 2018.
  • Goodbye to WPA 2 and Hello to WPA 3. [Here]. Date published: 10 August 2018.
  • GDPR NIS Directive Fines it forces those who don t do anything to at least do something . [Here]. Date published: 10 August 2018.
  • To Salt or Not To Salt Salting is not the only answer to securing passwords. [Here]. Date published: 9 August 2018.
  • The Prof Says Go Get Crypto The Rise of the Intelligent Bot Hackers. [Here]. Date published: 9 August 2018.
  • Block Sizes and Padding in A Most Amazing Machine. [Here]. Date published: 9 August 2018.
  • Which Crypto Hashing Method is a Gas And is as Slow as You Want and breaks GPUs . [Here]. Date published: 8 August 2018.
  • When Fast Just Isn t Enough Nobody inspects the spammish repetition. [Here]. Date published: 8 August 2018.
  • Random Numbers. [Here]. Date published: 8 August 2018.
  • How We Generate Encryption Keys From Pass Phrases. [Here]. Date published: 8 August 2018.
  • Getting Past Snake Oil And To Be Trusted As a Profession The Major Issue in Cyber Security . [Here]. Date published: 8 August 2018.
  • Generating an Encryption Key Without A Pass Phrase Meet ECIES. [Here]. Date published: 8 August 2018.
  • When Traceroute Turns Bad . [Here]. Date published: 7 August 2018.
  • The Beginning of the End of WPA 2 Cracking WPA 2 Just Got a Whole Lot Easier. [Here]. Date published: 7 August 2018.
  • I Met The Guy Who Invented The Pointe. [Here]. Date published: 7 August 2018.
  • Don t Just Sit Back Go Be Part of Building Our Future Discover Engage and Create Impact. [Here]. Date published: 7 August 2018.
  • NewHope Quantum robust Crypto for Key Generation using Ring Learning With Errors. [Here]. Date published: 6 August 2018.
  • From AES to Red Pike. [Here]. Date published: 6 August 2018.
  • Probabilistic Encryption using the Goldwasser Micali GM method. [Here]. Date published: 5 August 2018.
  • LinkedIn s Great But . [Here]. Date published: 5 August 2018.
  • John McAfee Talks Crypto and Provides A Bit of Colour in Crypto Land. [Here]. Date published: 5 August 2018.
  • If you re struggling picking a Crypto suite Fernet may be the answer. [Here]. Date published: 5 August 2018.
  • How Do Ratchets Protect Your Data . [Here]. Date published: 5 August 2018.
  • How Do I Prove My Password Without Giving You It The Magic of SRP. [Here]. Date published: 5 August 2018.
  • Genius Comes From Many Angles . [Here]. Date published: 5 August 2018.
  • Everything You Wanted To Know about Integer Factorization but Were Afraid To Ask . [Here]. Date published: 5 August 2018.
  • Can We Ever Create Systems which are Secure by design . [Here]. Date published: 5 August 2018.
  • Bringing Down The Internet. [Here]. Date published: 5 August 2018.
  • Boiling Every Ocean on the Planet 16 384 times To Crack A Single Key. [Here]. Date published: 5 August 2018.
  • Well There Goes My Domain Name Crypto com Cryptography or Cryptocurrency . [Here]. Date published: 4 August 2018.
  • The True Transformation Begins Smart Contracts Digital Signing and Law. [Here]. Date published: 4 August 2018.
  • The Secret Is Out Great Researchers Don t Necessarily Make The Best Teachers and Vice Versa . [Here]. Date published: 4 August 2018.
  • Supersingular Isogeny Diffie Hellman SIDH for Post Quantum Computer Key Generation. [Here]. Date published: 4 August 2018.
  • So What Is the Most Costly Type of Data in a Data Breach Health related. [Here]. Date published: 4 August 2018.
  • Posting The Key To Your Front Door To Stop A Robbery. [Here]. Date published: 4 August 2018.
  • Minority Report Becomes Real. [Here]. Date published: 4 August 2018.
  • Is Cryptography the Ohm s Law of Cyber Security . [Here]. Date published: 4 August 2018.
  • In A Blockchain World BA Wouldn t Have Been Able To Just Cancel Tickets. [Here]. Date published: 4 August 2018.
  • For crypto geeks there s only one place to present your ideas Zug. [Here]. Date published: 4 August 2018.
  • Crime Cyber Security and the Difference between a Daddy and a Father . [Here]. Date published: 4 August 2018.
  • Cracking The Internet With Waves. [Here]. Date published: 4 August 2018.
  • Can I Skype you No I ll see you here in a couple of week. [Here]. Date published: 4 August 2018.
  • Are Old Ways of Government Engagement With Citizens Out dated . [Here]. Date published: 4 August 2018.
  • 1 TB Encryption Key . [Here]. Date published: 4 August 2018.
  • WPA 2 Hash Cracking. [Here]. Date published: 3 August 2018.
  • What Did The Ancient Chinese Teach Us About Hacking . [Here]. Date published: 3 August 2018.
  • It has been around for 20 years and it s still a problem. [Here]. Date published: 3 August 2018.
  • How To Give a Million Lectures. [Here]. Date published: 3 August 2018.
  • A Bluffer s Guide to TLS 1 3. [Here]. Date published: 3 August 2018.
  • Route Summarization. [Here]. Date published: 2 August 2018.
  • Getting Ready to Tangle Meet the New World of IoT IOTA. [Here]. Date published: 2 August 2018.
  • BlueZero A Major and Sloppy Bluetooth Vulnerability Patch Now . [Here]. Date published: 2 August 2018.
  • Why Companies Should Perfect The Art of Lying In Order to Preserve Your Privacy. [Here]. Date published: 1 August 2018.
  • Security Testing on a R PI. [Here]. Date published: 1 August 2018.
  • Paillier Shines a Light On a New World of Computing. [Here]. Date published: 1 August 2018.
  • Living In A GDPR World Preserving our Information With Zero Knowledge Proofs Meet Fiat Shamir. [Here]. Date published: 1 August 2018.
  • Hunting the SNARK How Do We Prove A Mathematical Computation Without Knowing The Values Used . [Here]. Date published: 1 August 2018.
  • How Do We Flip A Billion Coins in a Fair Way and Writing Your Name in Crypto . [Here]. Date published: 1 August 2018.
  • How A Geek Can Win in the Lottery. [Here]. Date published: 1 August 2018.
  • A Risk To Internet Freedom or True Clampdown On Objectionable Content . [Here]. Date published: 1 August 2018.
  • A jewellery box and data privac. [Here]. Date published: 1 August 2018.
  • A Blast From the Past WEP One of the Poorest Wi fi standards Ever . [Here]. Date published: 1 August 2018.
  • Upgrading a Speeding Car While Its Still In Motion. [Here]. Date published: 31 July 2018.
  • Time for a Cha cha or a Salsa . [Here]. Date published: 31 July 2018.
  • The only way is zero Can you get past the Troll . [Here]. Date published: 31 July 2018.
  • The Big Game but Bob and Alice just don t trust each other or in fact anyone The Mental Poker . [Here]. Date published: 31 July 2018.
  • Telling Cyber Security Stories and Coffee Cups. [Here]. Date published: 31 July 2018.
  • It s Your Birthday. [Here]. Date published: 31 July 2018.
  • Is your number really random . [Here]. Date published: 31 July 2018.
  • In a Blockchain World How Can We Tell If Bob is older than Alice without revealing their ages . [Here]. Date published: 31 July 2018.
  • How Does Peggy Prove Her Age Without Giving Away Her Age . [Here]. Date published: 31 July 2018.
  • How Do I Book a Seat at the Edinburgh Festival Without Giving You My Name Address and Any Other . [Here]. Date published: 31 July 2018.
  • Happy Birthday Bitcoin. [Here]. Date published: 31 July 2018.
  • Garbled Circuits SFE With Oblivious Transfer. [Here]. Date published: 31 July 2018.
  • Analysing Passwords We Are Human BTW. [Here]. Date published: 31 July 2018.
  • 25bn down the back of the sofa. [Here]. Date published: 31 July 2018.
  • Which is the easiest crime to implement with the largest potential return and with virtually no . [Here]. Date published: 30 July 2018.
  • The Sting 2018 The Tale of The Dark Web. [Here]. Date published: 30 July 2018.
  • So What s A Finite Field and Why Is It So Important to your Privacy . [Here]. Date published: 30 July 2018.
  • SHA 3 Keccak Gr stl Blake SHAKE and Skein The Final Versions. [Here]. Date published: 30 July 2018.
  • Rather Than Ask Google Let s Ask Shodan. [Here]. Date published: 30 July 2018.
  • Mod P Polynomial Operations Towards Quantum Robust Crypto. [Here]. Date published: 30 July 2018.
  • Meet Macie Your Cloud Bucket Protector. [Here]. Date published: 30 July 2018.
  • Is Cryptography the Ohm s Law of Cyber Security . [Here]. Date published: 30 July 2018.
  • Innovation Disruption and Loving What You Do . [Here]. Date published: 30 July 2018.
  • For the love of computing Did you mean 0 or O . [Here]. Date published: 30 July 2018.
  • Enough of the Hype A Practical Introduction to Blockchain. [Here]. Date published: 30 July 2018.
  • Electronic Tickets Innovative and pioneering . [Here]. Date published: 30 July 2018.
  • Cyber Warfare Not if but when . [Here]. Date published: 30 July 2018.
  • Cracking The Internet With Waves. [Here]. Date published: 30 July 2018.
  • Cars CANs and Cracking. [Here]. Date published: 30 July 2018.
  • As a PhD Examiner My Top 25 Tips for PhD students and a few more . [Here]. Date published: 30 July 2018.
  • A Full Diary of a Cyber Crime From Phishing to Profit. [Here]. Date published: 30 July 2018.
  • pay CS teachers more ain t going to happen with current Union Local Authority cabal witness . [Here]. Date published: 30 July 2018.
  • Your old road is rapidly agin Ring Signatures and Anonymisation in an era of privacy. [Here]. Date published: 29 July 2018.
  • Time Locked Puzzles and Proof of Work. [Here]. Date published: 29 July 2018.
  • The Long term Neglect of Computer Science at School in Scotland . [Here]. Date published: 29 July 2018.
  • Shamir The Engineer Builder and Tester of the Information Age From Innovators to Cyber Punks a . [Here]. Date published: 29 July 2018.
  • Lattice Encryption NTRU Key Generation. [Here]. Date published: 29 July 2018.
  • 1 in 4 National Bodies of Scotland Fail in Basic HTTPs Test. [Here]. Date published: 29 July 2018.
  • Supersingular Isogeny Diffie Hellman for Key Generation. [Here]. Date published: 28 July 2018.
  • Quantum Robust Hash based Signatures. [Here]. Date published: 28 July 2018.
  • Learning With Errors and Ring Learning With Errors. [Here]. Date published: 28 July 2018.
  • Having Fun With BN curves. [Here]. Date published: 28 July 2018.
  • Having Fun With Bitcoins Vanity Bitcoin Address Generation. [Here]. Date published: 28 July 2018.
  • The Day Health and Social Care Went Off line in Scotland. [Here]. Date published: 27 July 2018.
  • Smooth Numbers. [Here]. Date published: 27 July 2018.
  • The Wonderful World of Elliptic Curve Cryptography. [Here]. Date published: 26 July 2018.
  • Happy Birthday to John Napier Helping To Build A More Trusted World. [Here]. Date published: 5 April 2018.

Referencing this page

This site is currently free to use and does not contain any advertisements, but should be properly referenced when used in the dissemination of knowledge, including within blogs, research papers and other related activities. Sample reference forms are given below.

Ref: Buchanan, William J (2025). Blogs. Asecuritysite.com. https://asecuritysite.com/blogs

Bib: @misc{asecuritysite_12843, title = {Blogs}, year={2025}, organization = {Asecuritysite.com}, author = {Buchanan, William J}, url = {https://asecuritysite.com/blogs}, note={Accessed: December 01, 2025}, howpublished={\url{https://asecuritysite.com/blogs}} }

Licence: This site is intended for the education and advancement of humans, and no rights are given for AI and ML bots to crawl this site. All references to its content must be included.
Follow @billatnapier Tweet Page Tweet #Asecuritysite