Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

The cryptoint library

Entropy Attacks

Looking at some claims that quantum computers won't work

The sins of the 90s: Questioning a puzzling claim about mass surveillance

Don't Publish with IEEE (2005)

Libntruprime is a microlibrary for the Streamlined NTRU Prime cryptosyst

Clang vs. Clang

Invulnerable Software (2008)

Bibliography keys: It's as easy as [1], [2], [3]

UTC, Tai, and Unix Time (2001)

A modest proposal for reducing mail traffic (1996)

Two File Descriptors for Sockets

Double encryption: Analyzing the NSA/GCHQ arguments against hybrids

Another way to botch the security analysis of Kyber-512

Reducing "gate" counts for Kyber-512 contradicting NIST's calculation

Debunking NIST's calculation of the Kyber-512 security level

Boring Crypto (2015) [pdf]

How to Write Software with Zero bugs – 25 years after qmail 1.0 – D. Bernstein [pdf]

The IPv6 mess (2002)

Turbo Boost

Is D.J. Bernstein our world's most brilliant living programmer?

Librandombytes – a public domain library for generating randomness

Libcpucycles is a public-domain microlibrary for counting CPU cycles

Multi-ciphertext security degradation for lattices

Libsecded

NSA, NIST, and post-quantum crypto: my second lawsuit against the US government

Timing Attacks

Internet Mail 2000

Plagiarism as a patent amplifier: Understanding the delayed rollout of PQC

The IPv6 Mess (2002)

More →