In Cybersecurity, Where Would You Find Dumbo, Jumbo and a Pink Elephant?

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Ransomware Attacks — Employees could be part of the problem

A Practical Example for McEliece Cryptography

BITSONIC’s Cyrpto School Part 6 — Trust Wallet Token

Proof That I Know Something… Proving I Know x for Hash(x)

Experts warn of text message scam that seems to use ‘real’ number

FilthFinder

Dig Out Your Patents, And Watch What You Use … $1.1 billion for a Patent Breach

Guide to BAND Token Swap on BandChain Wenchang Mainnet

Samsung has sold faulty Smart TVs and must fix them

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

The Answer to Life, The Universe, and Cybersecurity …

Homomorphic Addition and Subtraction using ElGamal

Everything You Want To Know About AES, But Were Afraid To Ask …

Zero-Knowledge Proofs and Accumulators Using Kryptography and Crypto Pairings