cr.yp.to: The death of due process

Security Fraud in Europe's “Quantum Manifesto”

Some thoughts on security after ten years of qmail 1.0 (2007)

Thomas Jefferson and Apple versus the FBI

DJB: Is the security of quantum cryptography guaranteed by the laws of physics?

The first 10 years of Curve25519

Placing documents into the public domain

Failures in NIST’s ECC standards

Break a dozen secret keys, get a million more for free

Entropy Attacks (2014)

How to manipulate curve standards: a white paper for the black hat

DJB: Boring Crypto

Brainpool curves

Understanding Brute Force (2005)

Snake Oil Crypto Competition

The IPv6 mess (2003)

Unix Client-Server Program Interface (1996)

Calculus for mathematicians (1997)

The death of optimizing compilers [pdf]

Some thoughts on security after ten years of qmail 1.0 (2007) [pdf]

The Death of Optimizing Compilers

UTC, TAI, and Unix time

Follow-You Printing

Curve25519: new Diffie-Hellman speed records (2006) [pdf]

Batch Numeric Field Sieve [pdf]

Making sure crypto remains insecure [pdf]

SPHINCS: practical stateless hash-based signatures

MinimaLT: Minimal-latency Networking Through Better Security (2013) [pdf]

Niklaus Wirth: A Plea for Lean Software (1995) [pdf]

Making sure software stays insecure [pdf]

More →