Jake Massimo

@Massicrypt

PhD Student in Cyber Security at Royal Holloway, University of London. Supervised by . Slowly turning tea into a thesis.

London, England
Vrijeme pridruživanja: prosinac 2015.

Tweetovi

Blokirali ste korisnika/cu @Massicrypt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Massicrypt

  1. proslijedio/la je Tweet
    22. sij

    Coming soon to OpenSSL: a simple, safe and performant API for primality testing. With , and with thanks to Kurt Roeckx from OpenSSL and who posed the question.

    Poništi
  2. proslijedio/la je Tweet
    20. stu 2019.

    Start with 82 and go backwards to 1 8281807978777675747372717069686 7666564636261605958575655545352 5150494847464544434241403938373 6353433323130292827262524232221 2019181716151413121110987654321 ...this number is prime!

    Poništi
  3. proslijedio/la je Tweet

    Wondering about security in a post-quantum world? Post-quantum TLS is now supported in AWS KMS.

    s2n logo
    Poništi
  4. proslijedio/la je Tweet

    The list of accepted presentations for IMA CC 2019 is out: Now is a good time to register

    Poništi
  5. 4. lis 2019.
    Poništi
  6. 12. ruj 2019.
    Poništi
  7. 18. kol 2019.

    A Brute-Force attack IRL (from r/specializedtools )

    Poništi
  8. proslijedio/la je Tweet
    17. kol 2019.

    I'm "2400 baud handshake noise" years old.

    Poništi
  9. proslijedio/la je Tweet
    15. srp 2019.

    We made a short video about primality testing - a nice challenge in 90 seconds:

    Poništi
  10. proslijedio/la je Tweet
    4. tra 2019.

    Theory: - malicious DH parameters for OpenSSL. ---> Practice: - increases rounds of Miller-Rabin testing in DH parameter validation. Nice work !

    Poništi
  11. 18. sij 2019.

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. With and available at:

    Poništi
  12. 26. stu 2018.

    Nice find Antonio, as you say simple to generate composites that fool the test. Not prize winning, but shouldn't be called upon as a library in it's current state. Couldn't resist, here's a toy example -

    Poništi
  13. proslijedio/la je Tweet
    30. lis 2018.

    Phew, CVE-2018-4398 is finally out - flaws in Apple's primality testing code in their CoreCrypto library, affecting multiple products and OSes. See Sections 1.3 and 4.8 of our updated paper at: , cc

    Poništi
  14. 30. lis 2018.

    I wrote a blog post about our findings in Apple's CommonCrypto (and corecrypto) library with security update now live in macOS Mojave 10.14.1 and iOS 12.1 with

    Poništi
  15. proslijedio/la je Tweet
    17. lis 2018.

    Honoured to present this prestigious award for fantastic research on adversarial primality testing.

    Poništi
  16. proslijedio/la je Tweet
    17. lis 2018.

    Close but no cigar... our "prime and prejudice" paper made it to the final 9 for consideration for best paper award at

    Poništi
  17. 15. lis 2018.

    My short presentation from the CRYPTO 2018 rump session is now available online! Check it out, among other recordings from the conference at 😉

    Poništi
  18. proslijedio/la je Tweet
    11. lis 2018.

    lmao Kanye's iPhone password is 000000

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    Poništi
  20. proslijedio/la je Tweet
    21. kol 2018.

    Best rump session talk of was talking about

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·