How does Apple (privately) find your offline devices?

Attack of the week: searchable encryption and the ever-expanding leakage function

On Ghost Users and Messaging Backdoors

On cellular encryption (2013)

Let’s talk about PAKE

Why I’m leaving Chrome

A riddle wrapped in a curve. Is EC crypto safe? (2015)

Was the Efail disclosure horribly screwed up?

A Few Thoughts on Ray Ozzie’s “Clear” Proposal

Hash-based Signatures: An illustrated Primer

Apple in China: who holds the keys?

Attack of the Week: Group Messaging in WhatsApp and Signal

The strange story of “Extended Random”

A few thoughts on CSRankings.org: "the approach of CSRankings seems a bit arbitrary

Attack of the week: DUHK

A Few Thoughts on Cryptographic Engineering

Falling through the KRACKs

Patching is hard; so what?

Beyond public key encryption

Zero Knowledge Proofs: An illustrated primer, Part 2

Secure Computing for Journalists

Surviving a bad RNG (2012)

The future of Ransomware

A very casual introduction to Fully Homomorphic Encryption (2012)

Zero Knowledge Proofs: An illustrated primer

Android N Encryption

Is Apple's Cloud Key Vault a Crypto Backdoor?

Attack of the Week: 64 bit ciphers in TLS

How do we build encryption backdoors?

Statement on DMCA Lawsuit – Matthew Green

More →