Zero Knowledge Proofs: An illustrated primer

Can end-to-end encrypted systems detect child sexual abuse imagery?

Password Authenticated Key Exchange

How safe is Apple’s Safe Browsing? On iOS 13, Apple is sharing some of your web browsing with Tencent.

Looking Back at the Snowden Revelations

How does Apple (privately) find your offline devices?

Attack of the week: searchable encryption and the ever-expanding leakage function

On Ghost Users and Messaging Backdoors

On cellular encryption (2013)

Let’s talk about PAKE

Why I’m leaving Chrome

A riddle wrapped in a curve. Is EC crypto safe? (2015)

Was the Efail disclosure horribly screwed up?

A Few Thoughts on Ray Ozzie’s “Clear” Proposal

Hash-based Signatures: An illustrated Primer

Apple in China: who holds the keys?

Attack of the Week: Group Messaging in WhatsApp and Signal

The strange story of “Extended Random”

A few thoughts on CSRankings.org: "the approach of CSRankings seems a bit arbitrary

Attack of the week: DUHK

A Few Thoughts on Cryptographic Engineering

Falling through the KRACKs

Patching is hard; so what?

Beyond public key encryption

Zero Knowledge Proofs: An illustrated primer, Part 2

Secure Computing for Journalists

Surviving a bad RNG (2012)

The future of Ransomware

A very casual introduction to Fully Homomorphic Encryption (2012)

Zero Knowledge Proofs: An illustrated primer

More →