PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20243Mar 4, 20243
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Published inASecuritySite: When Bob Met AliceAndrew Chi-Chih YaoI had to smile when I read more about Andrew C Yao …2d ago2d ago
Order and Sub Groups Orders in ECCSo, Satoshi Nakamoto selected the secp256k1 curve, and the rest is history. But, how is a curve designed? Well, in ECC, we can have an…4d ago14d ago1
Creating Secure Covert Channels with LLMs over Public ChannelsThe world of LLMs (Large Language Models) is revolutionising many areas, but there has not been a great deal of work on using them in…5d ago15d ago1
The Mighty Base Point (G) in Elliptic Curve Cryptography — And What’s An Order?Your online security is highly dependent on a simple point on a curve — the base point, G. Every time you make a connection to the Web…5d ago15d ago1
Published inASecuritySite: When Bob Met AliceLiving With A Dictator: Anamorphic CryptographyLast week, I spent an amazing hour speaking with the mighty Moti Yung [here], and who outlined the usage of anamorphic cryptography:Apr 192Apr 192
TSPs, e-ID, e-IDAS 2 and the UK Digital WalletBuilding houses and then adding the foundationsApr 194Apr 194
Published inASecuritySite: When Bob Met AliceThink of PQC As A Cyber World (As Mostly) Without TrapdoorsI attended a NIST workshop on PQC yesterday, and the chat was all around crypto agility. The move to PQC is basically just a natural part…Apr 18Apr 18
Benchmarking Digital Signatures: Ed25519 (EdDSA) Wins for Signing, RSA Wins for VerifyingI have compiled OpenSSL 3.5 and was looking forward to benchmarking PQC signatures, but, unfortunately, the speed test is not available for…Apr 15Apr 15