PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 42Mar 42
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
PQC and Symmetric Key in Perfect HarmonyThe Power of Public Key and the Speed of Symmetric Key2d ago22d ago2
Shock News: SHA-256, ECDSA and RSA Not Approved in Australia By 2030I am a bit shocked … SHA-256 will not be approved for use in Australia by 2030. From what I know at the current time, AES-256 and SHA-256…4d ago154d ago15
Published inASecuritySite: When Bob Met AliceHybrid Encryption with RSA and AESWell, in 1978, the world saw one of the greatest breakthroughs in security. This was the RSA paper [1], and it showed the world how we can…5d ago5d ago
Get Ready for NTTWithin lattice cryptography, such as in areas of post-quantum cryptography (PQC), Zero Knowledge Proofs (ZKPs) and homomorphic encryption…5d ago5d ago
Published inASecuritySite: When Bob Met AliceShould You Go Hybrid With Key Exchanges?With IBM producing quantum processors with 433 Qubits and Google showing off their Willow chip with 105 qubits of computing power, the…6d ago6d ago
Published inASecuritySite: When Bob Met AliceDoes Willow Cause a Major Risk to Public Key Methods?I had to smile when I saw this headline last week [here]:6d ago26d ago2
Published inASecuritySite: When Bob Met AliceThe True Dawn of ZKP and Secure MPC: Privacy and The Digital PoundI am proud to sit on an academic committee for the Digital Pound, and I am a great believer in the tokenization of our financial system. If…Dec 12Dec 12
Published inASecuritySite: When Bob Met AliceConverting Zero Knowledge Proofs to Digital SignaturesThe signature method of ECDSA is not a nice method, and it allowed us to create a signature which did not breach the Schnorr patent. But…Dec 8Dec 8