Soatok’s Guide to Side-Channel Attacks

A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates

GNU: A Heuristic for Bad Cryptography

How To Learn Cryptography as a Programmer

Why AES-GCM Sucks

The Easy Way to Obtain a Website's IP Address That Hides Behind CloudFlare

Putting the “Fun” in “Hash Function”