To find the backdoored crypto, we'd look for the complex papers with unreadable code that do magic things with handwavy explanations, no? 
-
-
the assembly code is definitely checked "less" often, and is often just ported from reference code.
-
Shameless plug :) This sort of why we have Vale and HaCl* together in Everest…https://github.com/project-everest/vale …
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.