Asymmetric Cryptographic Commitments

Database Cryptography Fur the Rest of Us

How You Respond to Security Researchers Says Everything About You

What We Do in the /etc./Shadow – Cryptography with Passwords

Extending the AES-GCM Nonce Without Nightmare Fuel

Towards End-to-End Encryption for Direct Messages in the Fediverse

Should You Delete Your Patreon Account After They Laid Off Their Security Team?

Cryptographic Agility and Superior Alternatives

Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022

Using RSA Securely in 2022

The Controversy Surrounding Hybrid Cryptography

Understanding HKDF

Threema: Three Strikes, You’re Out

Programmers Don’t Understand Hash Functions

Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset

Canonicalization Attacks Against Macs and Signatures

Trivial Proof of the Collatz Conjecture

Why Furries Make Excellent Hackers

Dead Ends in Cryptanalysis #2: Timing Side-Channels

A Furry’s Guide to Cryptocurrency

Understanding Extended-Nonce Constructions

No Gates, No Keepers

Crackpot Cryptography and Security Theater

Cryptography Interface Design is a Security Concern

On the Toxicity of Zed A. Shaw (With Bonus 0days)

Please Stop Encrypting with RSA Directly

Block Cipher Structures Ranked

Cryptographic Wear-Out for Symmetric Encryption

The Subtle Hazards of Real-World Cryptography

Going Bark: A Furry’s Guide to End-to-End Encryption

More →