Tweetovi

Blokirali ste korisnika/cu @ThomasPeyrin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ThomasPeyrin

  1. Prikvačeni tweet
    10. svi 2019.

    Our paper on chosen-prefix collision attack for SHA-1 is out. TL;DR: computing such collision is very practical, for a reasonable cost. More results coming soon. Remove SHA-1 *now* if you still implement it for any digital signature/certificate use

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    . & researchers have found a critical flaw in a commonly used security , known as SHA-1, putting an end to 15 years of debate about whether it is still secure and useable.

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Une faille dans l’authentification électronique

    Poništi
  4. proslijedio/la je Tweet
    10. sij

    Slides from the Shambles talk at are now online:

    Poništi
  5. proslijedio/la je Tweet
    8. sij

    Those who are wondering why all 3rd party key-signatures are ignored since GnuPG 2.2.18 may want to read (, )

    Poništi
  6. 7. sij

    As promised a few months ago, with we computed a chosen-prefix collision for SHA-1 for much cheaper than 100k$. Application example with impersonation on PGP Web-of-trust. website: paper:

    Poništi
  7. proslijedio/la je Tweet

    Deoxys-II was selected as the first choice for the "in-depth security" portfolio of the CAESAR competition. It's a very cool cipher with attractive qualities. Check it out!

    Poništi
  8. 26. lip 2019.

    One postdoc/research fellow position available at NTU for a project on symmetric-key cryptography/side channel analysis/machine learning. PM me if interested!

    Poništi
  9. 19. lip 2019.

    Two postdoc/research fellow positions available for a project on symmetric-key cryptography/implementations for cars. It is a project between Lund University (Sweden) and NTU (Singapore). PM me if interested!

    Poništi
  10. proslijedio/la je Tweet

    ‘Elon Musk as a baby’ deep fake is terrifying. This is a brave new world folks.

    Poništi
  11. proslijedio/la je Tweet
    9. svi 2019.

    ANSSI's Hardware Security Laboratory publishes an open-source AES-128 encryption/decryption library for ARM Cortex M3/M4 with state-of-the-art countermeasures against basic side-channel attacks. Made available for research and comparison:

    Poništi
  12. proslijedio/la je Tweet
    6. svi 2019.

    Postdoc / Research Fellow: Lund University, Sweden - Nanyang Technological University (NTU), Singapore

    Poništi
  13. proslijedio/la je Tweet
    11. ožu 2019.

    NTU Professors Win International Cryptography Competition. Congratulations Prof Hongjun Wu and Prof Thomas Peyrin! 😀 Read more:

    Poništi
  14. 8. ruj 2018.
    Poništi
  15. proslijedio/la je Tweet
    8. lis 2015.

    "The SHAppening" is the best moniker they could have possibly chosen for this attack. Kudos.

    Poništi
  16. proslijedio/la je Tweet

    SHA1 algorithm securing e-commerce and software could break by year’s end by

    Poništi
  17. proslijedio/la je Tweet
    21. srp 2011.

    Yes, was breached. And we have lots of restricted material. With some simple injection. In the next days, wait for interesting data :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·