Nick SullivanOvjeren akaunt

@grittygrease

Head of Research (and Cryptography) ⋆ Open DMs

San Francisco, CA
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @grittygrease

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @grittygrease

  1. Prikvačeni tweet

    Thread. I was recently privy to a conversation in which some really smart people in security shared their favorite papers or articles. Security engineering, like other disciplines, has a rich history worth learning from. I'm going to list some of these papers in this thread.

    Prikaži ovu nit
    Poništi
  2. Cahill-Keyes projection but for Mandelbrot sets.

    Poništi
  3. We’re so happy to have you on the team!!

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    I'm really really happy to be joining the cryptographic team at with , , and so many other amazing people very soon! This is such an amazing thing!

    Poništi
  5. So I'm told there's a special handshake for people with 20k followers and 20k-ers are a bit intense about this. I guess I'll learn soon when the 20k monk visits me. To accelerate the coming of the monk, I'm going to send 1 Zcash to my 20,000th follower! (my only giveaway ever)

    Poništi
  6. Hiring in tech is super difficult and requires a lot of documentation and processes in place to scale. I discovered 's hiring templates today and have found them really useful for refreshing my thinking around hiring.

    Poništi
  7. I’m excited to help Real World Crypto continue to bridge the gap between academic cryptography and real world applications. There’s a very special community here and I hope to nurture and serve it.

    Poništi
  8. I'm very pleased to welcome to the research team as the UK/EU research lead!

    Poništi
  9. proslijedio/la je Tweet
    24. sij

    This is how an IETF Messaging Layer Security (MLS) secure group messaging session evolves over time… Our CGKA is called TreeKEM and most of the time requires O(log N) encryptions / O(1) decryption for changes in active groups.

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms

    Prikaži ovu nit
    Poništi
  11. Fun swag from the Applied Crypto Symposium today. No billiards analogies, though.

    Poništi
  12. Who says Macs are immune to malware? I spent 20 minutes removing malicious enterprise profiles installed by spyware on a person in tech's Mac yesterday. If Chrome sends your searches to Bing or your new tab page says "search" in Google-esque rainbow colors, you've been got.

    Poništi
  13. proslijedio/la je Tweet
    15. sij

    I've so loved my 11 years here in DC, working in the non-profit and government world. But this year, I'm changing it up in the private sector: I'll be the lead product manager for Chrome Security. It's a terrific team whose work I've long admired, and I'm excited to jump in!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Thank you to , who stepped down as co-chair of the Crypto Forum Research Group today, after many years of service. Welcome to , who joins and as co-chair going forward.

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  16. Name your curves.

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    It looks like it exploits what Vaudenay warned against in 2004 : "Digital Signature Schemes with Domain Parameters" ( )

    Prikaži ovu nit
    Poništi
  18. Reading the tea leaves here, it seems to be a problem with custom elliptic curves, which the industry has been moving away from. I would wager that conforming TLS 1.3-only clients are not susceptible to this class of problem. Still, most PKIX libraries support older use cases.

    Poništi
  19. proslijedio/la je Tweet
    11. sij
    Prikaži ovu nit
    Poništi
  20. Also, having people with a diversity of backgrounds and experiences with the ability to express complex ideas in a clear way and the confidence to share dissenting options has been very useful.

    Prikaži ovu nit
    Poništi
  21. There are new problems too, like detecting malicious updates to offline parties. Maybe, like RTreeKEM, algebraic properties could be leveraged in novel way to help. Instead of ECIES+ECDSA+SHA in TreeKEM, could a Schnorr chord (UPKE + Sig + Pedersen hash) help prove consistency?

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·