Key Transparency and the Right to Be Forgotten

HashML-DSA Considered Harmful

kcrypt2 - a retrospective and a lab notebook

Hyper-encryption [Provably unbreakable hyper-encryption in the limited access model]

Nothing-up-my-sleeve number

Known Attacks On Elliptic Curve Cryptography

Attestations: A new generation of signatures on PyPI

Beyond Bcrypt

Protecting Signal Keys on Desktop

Implementing Signal's Double Ratchet algorithm (2020)