
P256 in Sage
20200110
Reference code for creating NIST P256 curve objects in Sagemath.

Authenticated Dictionaries with Skip Lists and Commutative Hashing
20200105
Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.

The Hidden Number Problem
20190810
Notes on the Boneh and Venkatesan's paper describing the Hidden Number Problem and code demonstrating some of the results.

ECDSA is Weird
20190728
Unexpected properties of ECDSA signatures.

Measures of Entropy
20190602
Different ways to describe the entropy of a random variable.

RSAbased Key Encapsulation Mechanisms
20190527
How to use RSA to encrypt symmetric keys and how RSAKEM relates to RSAOAEP.

Questions for System Design Reviews
20190512
Moving towards operationalizing system design reviews. What questions should a review team ask, or expect to be answered?

What is the Valueadd of sshagent?
20190114
The purpose of sshagent and observations how sshagent improves UX and security.

FiatShamir Heuristic
20180922
Overview and implementation of the FiatShamir heuristic used to build signature schemes from interactive zeroknowledge proofs.

Building Lattice Reduction (LLL) Intuition
20170725
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.