Guillaume Endignoux

@GEndignoux

Security, cryptography, enthusiast - Caradoc (PDF parsing & validation) - pqcrypto signatures (Gravity-SPHINCS)

Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @GEndignoux

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GEndignoux

  1. proslijedio/la je Tweet
    30. sij

    This is wonderful news from the team at who have been contributing so much to Tock as part of this project! What an exciting platform for developers!

    Poništi
  2. 31. sij

    More about TockOS - an embedded OS written in Rust - here

    Prikaži ovu nit
    Poništi
  3. 31. sij

    Proud of the release of OpenSK, a fully open-source FIDO2 implementation that my team has been working on. The firmware code is 100% written in - with our FIDO2 app on top of TockOS. Check it out at

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Say hello to OpenSK: a fully open-source security key implementation -

    Poništi
  5. proslijedio/la je Tweet

    New open source project from Google: OpenSK. A FIDO U2F and FIDO2 implementation for Nordic nRF52840 board. I'm not an expert but it looks like a but with an open source firmware and 5 times cheaper... and great STL files to 3D print the case ;)

    Poništi
  6. proslijedio/la je Tweet
    3. pro 2019.

    more on hash-based signatures, SPHINCS+, and comparisons with and I's Gravity-SPHINCS still a lot more work needed no hash signatures, I think it's just the start! building signatures just using hash functions is kinda amazing

    Poništi
  7. 29. stu 2019.
    Poništi
  8. proslijedio/la je Tweet
    22. stu 2019.

    We have control flow in constants!

    Poništi
  9. 12. stu 2019.

    Helped finding 15 TCP side-channel vulnerabilities, 12 of which were new.

    Prikaži ovu nit
    Poništi
  10. 12. stu 2019.

    The search space is huge, but "downscaling" the constants is powerful!

    Prikaži ovu nit
    Poništi
  11. 12. stu 2019.

    Goal: find vulnerabilities at scale with model checking.

    Prikaži ovu nit
    Poništi
  12. 12. stu 2019.

    Last talk, on TCP inference attacks.

    Prikaži ovu nit
    Poništi
  13. 12. stu 2019.

    My take-away: implementing cryptography securely is hard. Even with careful techniques like masking, there can be branches that you forgot, or that compiler optimizations added.

    Prikaži ovu nit
    Poništi
  14. 12. stu 2019.
    Prikaži ovu nit
    Poništi
  15. 12. stu 2019.

    How to recover 4 bits from ECDSA nonces?

    Prikaži ovu nit
    Poništi
  16. 12. stu 2019.

    Next: deep-dive of CVE-2018-11976 by

    Prikaži ovu nit
    Poništi
  17. 12. stu 2019.

    Some applications still seed from UNIX timestamps...

    Prikaži ovu nit
    Poništi
  18. 12. stu 2019.

    Prime & probe in one slide. Really nice graphics!

    Prikaži ovu nit
    Poništi
  19. 12. stu 2019.

    Session on side-channels at First, great talk by on page cache attacks (aka CVE-2019-5489).

    Prikaži ovu nit
    Poništi
  20. 12. stu 2019.

    Congrats et al. for the awesome research on PDF encryption!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·