PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
The Wonderful World of Dilithium (aka ML-DSA) and The Fiat Shamir MethodWhen Zero Knowledge Proof Methods Become Digital Signatures1d ago1d ago
Published inASecuritySite: When Bob Met AliceNo Excuses: OpenSSL Enters the Quantum AgeMeet ML-KEM (FIPS 203), ML-DSA (FIPS 204) and SLH-DSA (FIPS 205)2d ago22d ago2
Piger Fabrica Syndrome: The End of Public Key Encryption?What’s the shortest book in the world?5d ago85d ago8
Xmas Coming Early: OpenSSL Finally Enters a Quantum WorldThere is just one week to go (8 April 2025) for a major cybersecurity software release: OpenSSL 3.5.Mar 29Mar 29
Get Ready for FN-DSA: Slower Than Dilithium But Smaller Keys/CiphertextCurrently, we have two main digital signature standards for PQC. These are FIPS 204 (Dilithium — ML-DSA) and FIPS 205 (SPHINCS+ — SLH-DSA)…Mar 28Mar 28
How Public Key Encryption (PKE) Differs From Key Encapsulation Methods (KEMs)I got into a big debate today with someone who just didn’t understand the difference between PKE and KEM, so here’s a basic explanation…Mar 262Mar 262
Published inASecuritySite: When Bob Met AliceTelecoms Goes Post Quantum With Attribute-Based Encryption (ABE)As you may know, some telecoms industries are well behind the rest of the world in terms of cybersecurity, and the GSM network is often…Mar 262Mar 262