Lucid Multi-Key Deputies Require Commitment
This isn’t (necessarily) a security vulnerability; merely an observation that I don’t think has been articulated adequately within the cryptography community. I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems. Background Once…
Keep readingWe Need Non-Interactive Post-Quantum KEMs
Our Post-Quantum KEMs should work in environments where the secret key isn’t available for computations.
Keep readingToward Hybrid Post-Quantum Signatures
A very high-level view of [hybrid] post-quantum cryptography.
Keep readingPolice CyberAlarm Uses Alarming Cryptography
Today we’re going to be talking about this code, shared on Twitter by Paul Moore. It’s worth noting that this code snippet was after Paul attempted to alert them to security issues with the previous iteration of their encryption software, which looked like this:…
Keep reading