Should You Delete Your Patreon Account After They Laid Off Their Security Team?

Cryptographic Agility and Superior Alternatives

Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022

Using RSA Securely in 2022

The Controversy Surrounding Hybrid Cryptography

Understanding HKDF

Threema: Three Strikes, You’re Out

Programmers Don’t Understand Hash Functions

Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset

Canonicalization Attacks Against Macs and Signatures

Trivial Proof of the Collatz Conjecture

Why Furries Make Excellent Hackers

Dead Ends in Cryptanalysis #2: Timing Side-Channels

A Furry’s Guide to Cryptocurrency

Understanding Extended-Nonce Constructions

No Gates, No Keepers

Crackpot Cryptography and Security Theater

Cryptography Interface Design is a Security Concern

On the Toxicity of Zed A. Shaw (With Bonus 0days)

Please Stop Encrypting with RSA Directly

Block Cipher Structures Ranked

Cryptographic Wear-Out for Symmetric Encryption

The Subtle Hazards of Real-World Cryptography

Going Bark: A Furry’s Guide to End-to-End Encryption

A Brief Introduction to Deniability

Bizarre Design Choices in Zoom’s End-to-End Encryption

Bizarre Design Choices in Zoom’s End-to-End Encryption

Dead Ends in Cryptanalysis: Length Extension Attacks

EduTech Spyware Is Still Spyware: Proctorio Edition

Designing New Cryptography for Non-Standard Threat Models

More →