Tweets

You blocked @veorq

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @veorq

  1. Pinned Tweet
    30 Dec 2019

    it's out will present it at the paper I'm the proudest of thanks to

    Undo
  2. 1 hour ago

    someone claims to have "cracked" RSA, should I tell him that Time AI already did?

    Undo
  3. Feb 1

    🧂 := randomSalt() if !IsGoodRandomSalt(🧂) { return ("bad bad salt!") } 😜

    Undo
  4. Jan 31

    authentication path, Merkle path, Merkle proof, inclusion proof.. looks like we need a standard term for this, any other candidates? /cc

    Undo
  5. Jan 31

    before our post on E4's crypto, this writeup by starts by talking of threat modelling, functional constraints, trust assumptions, business needs, platform support, etc. the opposite or typical twitter/HN is-it-secure-or-insecure discussions

    Undo
  6. Jan 31

    billion-dollar business idea: a product that empties a dishwasher automatically and stacks clean dishes at the right place; I'll be the first customer

    Undo
  7. Retweeted

    We put together a site to look for applied crypto research. Eprint is great, but wading through 1500 papers/yr for 100 practical papers is 💩. Join us and help out!

    Show this thread
    Undo
  8. Retweeted
    Jan 29
    Show this thread
    Undo
  9. Jan 29

    cargo tools that may or may not be useful when auditing code: audit, clippy, geiger, outdated others?

    Undo
  10. Retweeted
    Jan 29

    It was an honor and a pleasure to collaborate with MongoDB to help review and strengthen their new client-side encryption, great crypto engineering challenge!

    Undo
  11. Retweeted

    Slides posted for my talk on the work behind MongoDB's new client side encryption. Especially grateful for the collaboration with , , and .

    Undo
  12. Jan 29

    this IOActive report on LoRaWAN is more marketing than research, as usual , but correctly points out known security shortcomings of LoRa encryption and key management; tech can help here, for Sigfox as well

    Undo
  13. Jan 29
    Undo
  14. Jan 28

    among the following WIP for 's E4, which one should we prioritize? (see , )

    Undo
  15. Jan 28

    after IaC, CaC, soon crypto as code? meta-language defining a protocol and CraC takes care of generating (verified?) implementations and their unit tests and benchmarks; crypto bot generates the research paper and automatically submits it to a conference

    Undo
  16. Retweeted
    Jan 27
    Undo
  17. Jan 27

    where we explain, among others, why "the Signal protocol of IoT" must be very different than the Signal protocol great post by

    Undo
  18. Retweeted
    Jan 27
    Replying to

    Who wants that?! I prefer buggy non-portable implementations with hard coded pointer widths and buffer overflows galore. Bonus points if it just doesn't implement the scheme in question correctly!

    Undo
  19. Jan 27

    "Clean, portable, tested implementations of post-quantum cryptography"

    Undo
  20. Jan 26

    Elliptic curve crypto sucks :-p "Extrapolating (...), at similar classical security levels, elliptic curve cryptography is less secure than RSA against a quantum attack

    Undo
  21. Retweeted

    Continuing to move the game forward . Much respect my brother 💪🏾 #33644

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·