PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Wonderful Ring Learning With Errors (RLWE) and Homomorphic EncryptionWe live in a computing world which has really changed much from the computing model defined by Von Numan. Basically all our data bits can…1d ago1d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceEUCLEAK and Side ChannelsAnd it’s not just YubiKeys4d ago14d ago1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSqueezing Bits: Meet MD, Sponge and HAIFAAt a conference in 1989, something magical happened that changed cybersecurity. Ralph Merkle presented a paper on digital signatures [1]:4d ago4d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceMy Top 5 Programming LanguagesI use GitHub a great deal and I have some open source developments, but I mainly use it for private version control of documents and source…Sep 1Sep 1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceRockets, Electric Cars and When Open Source Goes For ProfitEllon Musk has taken so many risks in his life, and — inspired by Hitchhickers Guide to the Galley — asked the question of why we can’t…Aug 312Aug 312
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceTeaching Theory and Practice in Cryptography: The Wonderful Jupyter NotebooksYou should never stick to what you know, and should always push yourself in innovate and change something about your work. In this way you…Aug 31Aug 31
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAuthenticated Key Exchange with MQVThe Diffie-Hellman method saved the Internet, but it also caused a problem: Eve-in-the-Middle, and where Eve could intercept the key…Aug 271Aug 271
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWhat Does a Secret Key Look Like in Homomorphic Encryption?Like it or not, the rise of quantum computers will see the end of the RSA, discrete logs and elliptic curve methods in our public key…Aug 27Aug 27