cryptography
-
P-256 in Sage
2020-01-10
Reference code for creating NIST P-256 curve objects in Sagemath.
-
Authenticated Dictionaries with Skip Lists and Commutative Hashing
2020-01-05
Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.
-
The Hidden Number Problem
2019-08-10
Notes on the Boneh and Venkatesan's paper describing the Hidden Number Problem and code demonstrating some of the results.
-
ECDSA is Weird
2019-07-28
Unexpected properties of ECDSA signatures.
-
Measures of Entropy
2019-06-02
Different ways to describe the entropy of a random variable.
-
RSA-based Key Encapsulation Mechanisms
2019-05-27
How to use RSA to encrypt symmetric keys and how RSA-KEM relates to RSA-OAEP.
-
Fiat-Shamir Heuristic
2018-09-22
Overview and implementation of the Fiat-Shamir heuristic used to build signature schemes from interactive zero-knowledge proofs.
-
Building Lattice Reduction (LLL) Intuition
2017-07-25
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.
-
Subgroup Confinement Attacks
2017-01-14
Subgroup confinement attacks can apply in offline and online contexts.
-
The GGH Cryptosystem
2016-11-23
An introduction to lattice-based cryptography using the broken Goldreich–Goldwasser–Halevi (GGH) cryptosystem.