Why Furries Make Excellent Hackers

Dead Ends in Cryptanalysis #2: Timing Side-Channels

A Furry’s Guide to Cryptocurrency

Understanding Extended-Nonce Constructions

No Gates, No Keepers

Crackpot Cryptography and Security Theater

Cryptography Interface Design is a Security Concern

On the Toxicity of Zed A. Shaw (With Bonus 0days)

Please Stop Encrypting with RSA Directly

Block Cipher Structures Ranked

Cryptographic Wear-Out for Symmetric Encryption

The Subtle Hazards of Real-World Cryptography

Going Bark: A Furry’s Guide to End-to-End Encryption

A Brief Introduction to Deniability

Bizarre Design Choices in Zoom’s End-to-End Encryption

Bizarre Design Choices in Zoom’s End-to-End Encryption

Dead Ends in Cryptanalysis: Length Extension Attacks

EduTech Spyware Is Still Spyware: Proctorio Edition

Designing New Cryptography for Non-Standard Threat Models

Soatok’s Guide to Side-Channel Attacks

A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates

GNU: A Heuristic for Bad Cryptography

How To Learn Cryptography as a Programmer

Why AES-GCM Sucks

The Easy Way to Obtain a Website's IP Address That Hides Behind CloudFlare

Putting the “Fun” in “Hash Function”