Better-performing “25519” elliptic-curve cryptography

The FIPS Compliance of HKDF

Friends don’t let friends reuse nonces

Digital signatures and how to avoid them

A few secure, random bytes without `pgcrypto`

Invisible Salamanders Are Not What You Think

Awala: The computer network on which humankind can rely

Signatures are like backups

Specification and Model-checking of the ZKsync Governance Protocol

Where can a career in GPU coding take you?

Dave: Discord's New End-to-End Encryption for Audio and Video

GoFetch: Will people ever learn?

Graviola: high quality, fast and easy to build cryptography for rustls

Alacrity to Federated Cryptography

The Cryptographic Doom Principle (2011)

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation

Post Quantum Cryptography for non-cryptographers

Safe curves for Elliptic Curve Cryptography [pdf]

FIPS Post Quantum Crypto standards approved

NIST finalizes post-quantum encryption standards

Against XMPP+omemo

“YOLO” is not a valid hash construction

Formally Verified Post-Quantum Algorithms

Missing Salamanders: Matrix Media can be decrypted to multiple valid plaintexts using different keys

Beyond Good & Evil and the 13th MDisk

Security Issues in Matrix’s Olm Library

NIST Releases First 3 Finalized Post-Quantum Encryption Standards

End to End Encryption (E2EE) on LiberaForms

NIST Announces Post-Quantum Cryptography Standards

AES encryption in Go

More →