Syed Shah Fahd

@shahfahd997

NUST, Islamabad Pakistan 🇵🇰

Rawalpindi, Pakistan
Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @shahfahd997

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shahfahd997

  1. proslijedio/la je Tweet
    1. velj

    AES S-box and Nothing Up My Sleeve

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Yesterday we were discussing how crucial end-to-end encryption is to privacy in EU, today we have this news from US...

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I had a great time chatting with at earlier this week about that every looming, enigmatic black box of terrible internet fears and confusion: the dark web. No, you can't buy hitman services. Yes, all of your data is compromised. Welcome.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Fun exercise in logic optimization; AES, AES inverse, and SM4 S-Boxes differ only in linear layers, so I added SM4 linear top and bottom layers to the Boyar-Peralta S-box. This is for the proposed super-lightweight RISC-V AES/SM4 instructions (parent dir).

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Btw the 46-page report is marked OFFICIAL, which is the lowest level of security controlled information (previously RESTRICTED/CONFIDENTIAL) and is not actually intended for public release. But it's right there on a HMG website; you can probably google for it and find it. oops..

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    “The implementation was also buggy and lacking. Some of the people on the Clipper team were so alarmed they secretly briefed opponents of the project, alerting them to insecurities in the design”

    Poništi
  7. proslijedio/la je Tweet

    Oh good. Shit we had backdoors but hey OOPS we removed them it's all ok.

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    "Clean, portable, tested implementations of post-quantum cryptography"

    Poništi
  9. proslijedio/la je Tweet
    26. sij
    Poništi
  10. proslijedio/la je Tweet
    22. sij
    Odgovor korisniku/ci

    Do not boast about your achievement unnecessarily! "Seek help in meeting your needs by keeping quiet (and not boasting around), for everyone who is blessed is envied (by some or the other in some or the other way)." [Classed as saheeh by Shaikh al-Albaani in Sahih-al-Jaami 943]

    Poništi
  11. proslijedio/la je Tweet
    23. sij

    [New] Further Clarification on Mantin's Digraph Repetition Bias in RC4 (Pranab Chakraborty and Subhamoy Maitra)

    Poništi
  12. proslijedio/la je Tweet

    We are getting to the good bit now! 🙌🏼 Let's take a look at how Enigma was broken…

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    Our friends are today marking the 80th anniversary of the first wartime British break of Enigma. Discover more about this important event in our history and ask them your questions using

    Poništi
  14. proslijedio/la je Tweet
    Odgovor korisnicima

    The last Enigma messages were decrypted on the final days of WWII. Interceptors witnessed the breakdown of networks and where many of the final messages were simply operators wishing each other well. We'll be sharing more about the end of the war as we approach .

    Poništi
  15. proslijedio/la je Tweet
    21. sij

    My first cryptic crossword for the Financial Times is published today! Available at

    Poništi
  16. proslijedio/la je Tweet
    21. sij

    any good C implementations of GF(2^128) multiplication? (using PCLMULQDQ)

    Poništi
  17. proslijedio/la je Tweet
    17. sij

    more crypto trainings by and I! 🔐🔥 🇨🇭🧀 , Geneva, March 17-18 🇨🇦🥞 , Montreal, May 12-13 for years our training has covered elliptic curve domain parameters validation, just sayin :)

    Poništi
  18. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    More lies about encryption coming from William Barr. What a surprise. Look, it's simple: There are no safe back doors. "You create a back door for one actor, and many more will rush in."

    Poništi
  20. proslijedio/la je Tweet
    15. sij

    Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis: D Robissout, G Zaid, B Colombier, L Bossuet, A Habrard

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·