P-256 in Sage
Reference code for creating NIST P-256 curve objects in Sagemath.
Authenticated Dictionaries with Skip Lists and Commutative Hashing
Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.
The Hidden Number Problem
Notes on the Boneh and Venkatesan's paper describing the Hidden Number Problem and code demonstrating some of the results.
ECDSA is Weird
Unexpected properties of ECDSA signatures.
Measures of Entropy
Different ways to describe the entropy of a random variable.
RSA-based Key Encapsulation Mechanisms
How to use RSA to encrypt symmetric keys and how RSA-KEM relates to RSA-OAEP.
Overview and implementation of the Fiat-Shamir heuristic used to build signature schemes from interactive zero-knowledge proofs.
Building Lattice Reduction (LLL) Intuition
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.
Subgroup Confinement Attacks
Subgroup confinement attacks can apply in offline and online contexts.
The GGH Cryptosystem
An introduction to lattice-based cryptography using the broken Goldreich–Goldwasser–Halevi (GGH) cryptosystem.