write.as January 2019
01/29/2019
Differential Privacy: A Primer for a Non-technical Audience
privacytools.seas.harvard.edu January 2019
The (Almost) Secret Algorithm Researchers Used to Break Thousands of RSA Keys
algorithmsoup.wordpress.com January 2019
https://medium.com/cryptoadvance/bls-signatures-better-than-schnorr-5a7fe30ea716
medium.com January 2019
Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)
www.ru.nl January 2019
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
eprint.iacr.org January 2019
Project Everest: Reaching greater heights in internet communication security
www.microsoft.com January 2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
www.cs.purdue.edu January 2019
Csidh: Post-quantum Key Exchange Using Isogeny-based Group Actions
www.esat.kuleuven.be January 2019
Mihir Bellare and Eric Rescorla won the Levchin Prize
press-release.levchinprize.com January 2019
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
eprint.iacr.org January 2019
The Dark Side of Zero Knowledge: Undetectable Backdoor in zk-SNARK
blog.smartdec.net January 2019
NSA person in Real World Crypto audience reacts to Simon and Speck fiasco
youtu.be January 2019
Still Got Your Crypto: In Response to wallet.fail’s Presentation
www.ledger.fr January 2019
Attacking end-to-end email encryption: Efail, other attacks and lessons learned.
media.ccc.de January 2019