www.governmentattic.org April 2024
04/06/2024
National Security Agency (NSA) Tales of the Krypt (KRYPTOS Society newsletters) 1994-2003
Inner Product Argument (IPA) and a Polynomial Commitment Scheme
blog.lambdaclass.com September 2023
Getting apples, bananas or cherries from hash functions
research.kudelskisecurity.com September 2023
R1CS and QAP (zkSNARKs) : From Zero to Hero with Finite Fields & sagemath
risencrypto.github.io March 2023
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
www.nist.gov February 2023
Weil Pairing and the MOV attack on Elliptic Curve Cryptography
risencrypto.github.io November 2022
NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government
blog.cr.yp.to September 2022
Open to a fault: On the passive compromise of TLS keys via transient errors
www.usenix.org September 2022
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
harvardnsj.org September 2022