The sins of the 90s: Questioning a puzzling claim about mass surveillance

Clang vs. Clang

Bibliography keys: It's as easy as [1], [2], [3]

Double encryption: Analyzing the NSA/GCHQ arguments against hybrids

Another way to botch the security analysis of Kyber-512

Reducing "gate" counts for Kyber-512 contradicting NIST's calculation

Debunking NIST's calculation of the Kyber-512 security level

Turbo Boost

NSA, NIST, and post-quantum crypto: my second lawsuit against the US government

Plagiarism as a patent amplifier: Understanding the delayed rollout of PQC

Measuring "efficiency" in document prepration: Microsoft Word vs. LaTex

An introduction to vectorization (2019)

Why EdDSA held up better than ECDSA against Minerva

An Introduction to Vectorization

Reconstructing ROCA

Fast-key-erasure random-number generators

DJB: Break a dozen secret keys, get a million more for free [2015]

Security fraud in Europe's "Quantum Manifesto"

cr.yp.to: The death of due process

Security Fraud in Europe's “Quantum Manifesto”

Thomas Jefferson and Apple versus the FBI

Break a dozen secret keys, get a million more for free

Entropy Attacks (2014)

The Death of Optimizing Compilers

Follow-You Printing

DJB: Some small suggestions for the Intel instruction set