cryptography

P256 in Sage
20200110
Reference code for creating NIST P256 curve objects in Sagemath.

Authenticated Dictionaries with Skip Lists and Commutative Hashing
20200105
Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.

The Hidden Number Problem
20190810
Notes on the Boneh and Venkatesan's paper describing the Hidden Number Problem and code demonstrating some of the results.

ECDSA is Weird
20190728
Unexpected properties of ECDSA signatures.

Measures of Entropy
20190602
Different ways to describe the entropy of a random variable.

RSAbased Key Encapsulation Mechanisms
20190527
How to use RSA to encrypt symmetric keys and how RSAKEM relates to RSAOAEP.

FiatShamir Heuristic
20180922
Overview and implementation of the FiatShamir heuristic used to build signature schemes from interactive zeroknowledge proofs.

Building Lattice Reduction (LLL) Intuition
20170725
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.

Subgroup Confinement Attacks
20170114
Subgroup confinement attacks can apply in offline and online contexts.

The GGH Cryptosystem
20161123
An introduction to latticebased cryptography using the broken Goldreich–Goldwasser–Halevi (GGH) cryptosystem.