P-256 in Sage
Reference code for creating NIST P-256 curve objects in Sagemath.
Authenticated Dictionaries with Skip Lists and Commutative Hashing
Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.
The Hidden Number Problem
Notes on the Boneh and Venkatesan's paper describing the Hidden Number Problem and code demonstrating some of the results.
ECDSA is Weird
Unexpected properties of ECDSA signatures.
Measures of Entropy
Different ways to describe the entropy of a random variable.
RSA-based Key Encapsulation Mechanisms
How to use RSA to encrypt symmetric keys and how RSA-KEM relates to RSA-OAEP.
Questions for System Design Reviews
Moving towards operationalizing system design reviews. What questions should a review team ask, or expect to be answered?
What is the Value-add of ssh-agent?
The purpose of ssh-agent and observations how ssh-agent improves UX and security.
Overview and implementation of the Fiat-Shamir heuristic used to build signature schemes from interactive zero-knowledge proofs.
Building Lattice Reduction (LLL) Intuition
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.