Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @hashbreaker
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @hashbreaker
-
PKE/KEM decryption failures strike again: https://groups.google.com/a/list.nist.gov/d/msg/pqc-forum/YsGkKEJTt5c/V0eivEroAAAJ … Looks like Hamburg has broken the new (patented?) Round5 proposal to
#NISTPQC. Round5 is a semi-merge of HILA5 with the (patented) Round2 proposal; by "semi-merge" I mean that it has some new design elements in it.Thanks. Twitter will use this to make your timeline better. UndoUndo -
The quote is excerpted from the entertaining collection of anonymous reviews of the original Curve25519 paper. See https://cr.yp.to/talks.html#2016.03.09 … for more.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Has anyone verified the details of https://eprint.iacr.org/2018/699 ? This is the latest attack against NSA's Simon cipher. The central claim is that the smallest version of Simon is broken for 27 rounds, i.e., almost 85% of the full 32 rounds. Best previous result was 23, already scary.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
I wrote up (some of) my thoughts on Sunday's
#CRYPTO2018 Encryption & Surveillance workshop, and why it was worth having even though LE officials are just going to pervert it for their own ends. https://cyberlaw.stanford.edu/blog/2018/08/crypto-2018-%E2%80%9Cmiddle-ground%E2%80%9D-proposals-going-dark-fix … cc@Timothy_Edgar@djweitzner@eff@mvaria@pwnallthethingsThanks. Twitter will use this to make your timeline better. UndoUndo -
"Responsible disclosure" as defined by recalcitrant company where security is not job #1: you (1) find security problem, (2) write an exploit, (3) spend time discussing with company, (4) publish exploit. A better alternative, "accelerated responsible disclosure": do #4 before #3.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Unlike https://eprint.iacr.org/2018/749.pdf , I recommend: 1. Require+verify DH primality proofs, as in https://cr.yp.to/ecdh/curve25519-20051115.pdf … and https://safecurves.cr.yp.to/primeproofs.html …. 2. Standardize primes so this is cheap. 3. Ignore nitwits writing "the appendix that shows that 3 numbers are prime should be removed."
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
Trying again to get some attention for this. Please send your input to show that the new law still has issues. Openbare consultatie Wijziging Wiv 2017 https://www.internetconsultatie.nl/wiv2017
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Patching ACPI DSDT on your new Lenovo ThinkPad X1 Carbon 6th gen to get normal S3 suspend working under Linux? I'm looking for people to test a kernel patch so that the DSDT patch can be avoided in the future: https://marc.info/?l=qubes-users&m=153308905514481&q=p5 … Works for me.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
To be clear, I recommend ChaCha20 instead of ChaCha8. It's hard to find applications where such a fast RNG is a bottleneck. More importantly, after DES and RSA-512 and SHA-1 and Sweet32 and so on, hasn't the cryptographic community learned to stop cutting things so close?
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
It seems to me that the 3.02 number comes from Jan Wassenberg reimplementing ChaCha8 and then reimplementing some sort of RNG on top of that, instead of reusing existing (faster) ChaCha8 stream software and fast-key-erasure RNG software from the SUPERCOP software collection.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Puzzled by the comparative cycles/byte claims for Google's Randen (https://github.com/google/randen ) on Westmere. 1.54 for Randen, ok, but 3.02 for ChaCha8? I see 1.34 for ChaCha8 generating 1536 bytes, so 1536-byte fast-key-erasure RNG (https://blog.cr.yp.to/20170723-random.html …) should be well under 1.54.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
New djbsort release, version 20180729: https://sorting.cr.yp.to/changes.html Rewritten avx2 code (fully supported by latest verifier), now just 7328 Haswell cycles for the int32_sort(x,1024) benchmark. Large arrays are now sorted in place. Types now supported: int32, uint32, float32.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
Will be talking about cryptanalysis of
#NISTPQC; hope to see you there!https://twitter.com/IACRcrypto/status/1022916223791706113 …Thanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
It's not looking good for tri-linear maps. See Ben Smith's rump session talk at
#ANTS2018 https://ants.2018.rump.cr.yp.to/d03d11cd8d1fa6ac55c6dd5464317055.pdf …Thanks. Twitter will use this to make your timeline better. UndoUndo -
Slides now available from
#ANTS2018#ANTSXIII rump session: https://ants.2018.rump.cr.yp.toThanks. Twitter will use this to make your timeline better. UndoUndo -
New djbsort release, version 20180717: https://sorting.cr.yp.to/changes.html Verification now handles all five int32 implementations (avx2, portable1, portable2, portable3, portable4). API now provides both int32_sort and uint32_sort.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
... and just in time we've posted all deliverables and libraries (libpqcrypto, pqm4, pqhw) from PQCRYPTO: https://pqcrypto.eu.org Also check out our scientific papers and talk slides!
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
Tomorrow (17 July) Wouter Castryck
@WCastryck will present the achievements of PQCRYPTO to the HWP on Cyber Security.Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Daniel J. Bernstein Retweeted
More in
@pqc_eu news: Partner Academia Sinica organized a PQCRYPTO Mini-School and Workshop. Slides from the talks are now online at https://troll.iis.sinica.edu.tw/school+forum18/programme.shtml …Thanks. Twitter will use this to make your timeline better. UndoUndo -
"Sorting integer arrays: security, speed, and verification." Slides for first djbsort talk now available: https://cr.yp.to/talks.html#2018.07.11 …
Thanks. Twitter will use this to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.