<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/u/jaw/crypto</id>
  <updated>2022-04-01T09:14:27-04:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>Crypto Asset Recovery</title>
    <link rel="alternate" href="https://cryptoassetrecovery.com/"/>
    <id>23f4f24e556026eb8b27ad4b5009f3de</id>
    <published>2022-04-01T09:14:27-04:00</published>
    <updated>2022-04-01T09:14:27-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Crypto Asset Recovery</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>DavidEGrayson/ruby_ecdsa: This gem implements the Elliptic Curve Digital Signature Algorithm (ECDSA) almost entirely in pure Ruby.</title>
    <link rel="alternate" href="https://github.com/DavidEGrayson/ruby_ecdsa"/>
    <id>2755760c37b7b0f940cb8b56e60f4a45</id>
    <published>2022-02-21T12:32:18-05:00</published>
    <updated>2022-02-21T12:32:18-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">DavidEGrayson/ruby_ecdsa: This gem implements the Elliptic Curve Digital Signature Algorithm (ECDSA) almost entirely in pure Ruby.</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>intel/tinycrypt</title>
    <link rel="alternate" href="https://github.com/intel/tinycrypt"/>
    <id>e09afe52ee9bc8a4959309b4fef062ce</id>
    <published>2022-02-20T22:26:40-05:00</published>
    <updated>2022-02-20T22:26:40-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">intel/tinycrypt</summary>
    <content type="html">The TinyCrypt Library provides an implementation for constrained devices of a 
minimal set of standard cryptography primitives.</content>
  </entry>
  <entry>
    <title>lix2ng/qdsv: Full qDSA on all Cortex-M cores. M0, M3, M4 etc.</title>
    <link rel="alternate" href="https://github.com/lix2ng/qdsv"/>
    <id>8c29c36df2406852b924ac7caee3bfbd</id>
    <published>2021-04-02T12:50:24-04:00</published>
    <updated>2021-04-02T12:50:24-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">lix2ng/qdsv: Full qDSA on all Cortex-M cores. M0, M3, M4 etc.</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Software · Joost Renes</title>
    <link rel="alternate" href="https://joostrenes.nl/software/"/>
    <id>c6827b1c94fed9c09e23130f927028eb</id>
    <published>2021-04-02T12:41:58-04:00</published>
    <updated>2021-04-02T12:41:58-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Software · Joost Renes</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Curve9767 and Fast Signature Verification – NCC Group Research</title>
    <link rel="alternate" href="https://research.nccgroup.com/2020/04/28/curve9767-and-fast-signature-verification/"/>
    <id>64948ab45961f1b4d46b0815e0deb401</id>
    <published>2021-04-02T12:07:48-04:00</published>
    <updated>2021-04-02T12:07:48-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Curve9767 and Fast Signature Verification – NCC Group Research</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>mupq/pqm4: Post-quantum crypto library for the ARM Cortex-M4</title>
    <link rel="alternate" href="https://github.com/mupq/pqm4"/>
    <id>b92a37f98f0f99d0cf4b07bf8f3dfa07</id>
    <published>2021-04-01T14:31:13-04:00</published>
    <updated>2021-04-01T14:31:13-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">mupq/pqm4: Post-quantum crypto library for the ARM Cortex-M4</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</title>
    <link rel="alternate" href="https://www.rfc-editor.org/rfc/rfc8452.txt"/>
    <id>0a1c90c8b9b66d9f1fe17a8d44609abd</id>
    <published>2019-04-18T16:50:27-04:00</published>
    <updated>2019-04-18T16:50:27-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</summary>
    <content type="html">they do not fail catastrophically if a nonce is repeated</content>
  </entry>
  <entry>
    <title>Hash Collision Probabilities</title>
    <link rel="alternate" href="https://preshing.com/20110504/hash-collision-probabilities/"/>
    <id>8cbd1098855dd813c7445240e6939a2d</id>
    <published>2018-12-15T10:03:47-05:00</published>
    <updated>2018-12-15T10:03:47-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Hash Collision Probabilities</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering</title>
    <link rel="alternate" href="https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/"/>
    <id>0acc3f535fddcf9d36ff2ea6a3ebd9a3</id>
    <published>2018-10-19T23:59:17-04:00</published>
    <updated>2018-10-19T23:59:17-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering</summary>
    <content type="html">A PAKE protocol, first introduced by Bellovin and Merritt, is a special form of cryptographic key exchange protocol. Key exchange (or “key agreement”) protocols are designed to help two parties (call them a client and server) agree on a shared key, using public-key cryptography.</content>
  </entry>
  <entry>
    <title>How To Turn Loaded Dice into Fair Coins</title>
    <link rel="alternate" href="http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf"/>
    <id>9098f29cb6e647ce850865941e8f1888</id>
    <published>2018-08-23T13:22:51-04:00</published>
    <updated>2018-08-23T13:22:51-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">How To Turn Loaded Dice into Fair Coins</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem</title>
    <link rel="alternate" href="https://arxiv.org/pdf/1608.07032v1.pdf"/>
    <id>64d620fc6fab49ce3ec1f13b682cf5f1</id>
    <published>2016-09-01T11:35:29-04:00</published>
    <updated>2016-09-01T11:35:29-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>the historical success of collision attacks does not imply a danger of pre-image attacks</title>
    <link rel="alternate" href="https://tahoe-lafs.org/~zooko/preimage-attacks-color.html"/>
    <id>037040ff24776c798dbf3ac86fcdcb41</id>
    <published>2016-02-14T11:50:02-05:00</published>
    <updated>2016-02-14T11:50:02-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">the historical success of collision attacks does not imply a danger of pre-image attacks</summary>
    <content type="html">The main result of this investigation is that “the historical success of collision attacks does not imply a danger of pre-image attacks”.

</content>
  </entry>
  <entry>
    <title>Duplexing the sponge: single-pass authenticated encryption and other applications</title>
    <link rel="alternate" href="http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/presentations/DAEMEN_SpongeDuplexSantaBarbaraSlides.pdf"/>
    <id>f94ec48c663bd928b275738fdc2e46dd</id>
    <published>2016-02-07T16:55:37-05:00</published>
    <updated>2016-02-07T16:55:37-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Duplexing the sponge: single-pass authenticated encryption and other applications</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>B,TMSR~ Block Cipher Competition on Trilema - A blog by Mircea Popescu.</title>
    <link rel="alternate" href="http://trilema.com/2016/btmsr-block-cipher-competition/"/>
    <id>1ec7ddc24b514266d9a1a043375fc37e</id>
    <published>2016-02-06T13:38:04-05:00</published>
    <updated>2016-02-06T13:38:04-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">B,TMSR~ Block Cipher Competition on Trilema - A blog by Mircea Popescu.</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>crypt-dev - entropy loss with narrow-pipe iterated hashes</title>
    <link rel="alternate" href="http://www.openwall.com/lists/crypt-dev/2011/07/14/1"/>
    <id>09a966ed77f1ba4aebd70532afdb846f</id>
    <published>2016-01-22T15:20:21-05:00</published>
    <updated>2016-01-22T15:20:21-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">crypt-dev - entropy loss with narrow-pipe iterated hashes</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista</title>
    <link rel="alternate" href="http://css.csail.mit.edu/6.858/2013/readings/bitlocker.pdf"/>
    <id>fe76f09a442e170c4beac28b9d48053f</id>
    <published>2016-01-10T00:07:26-05:00</published>
    <updated>2016-01-10T00:07:26-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <link rel="alternate" href="https://www.ietf.org/rfc/rfc4270.txt"/>
    <id>e0d58133a904e040296264a81bdf5887</id>
    <published>2015-12-29T17:29:34-05:00</published>
    <updated>2015-12-29T17:29:34-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Attacks on Cryptographic Hashes in Internet Protocols</summary>
    <content type="html">Recent announcements of better-than-expected collision attacks in
   popular hash algorithms have caused some people to question whether
   common Internet protocols need to be changed, and if so, how.</content>
  </entry>
  <entry>
    <title>The Analysis of the Windows Vista Disk Encryption Algorithm</title>
    <link rel="alternate" href="http://dl.ifip.org/db/conf/dbsec/dbsec2008/El-FotouhD08.pdf"/>
    <id>46ba914308bb54b5b830506380b8b80d</id>
    <published>2015-12-20T16:55:32-05:00</published>
    <updated>2015-12-20T16:55:32-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">The Analysis of the Windows Vista Disk Encryption Algorithm</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>An Open Letter to Developers Everywhere (About Cryptography)</title>
    <link rel="alternate" href="https://gist.github.com/paragonie-scott/e9319254c8ecbad4f227"/>
    <id>b0477998503d7a21bc916cf03dbd2fc6</id>
    <published>2015-11-19T14:34:19-05:00</published>
    <updated>2015-11-19T14:34:19-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">An Open Letter to Developers Everywhere (About Cryptography)</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Stop using unsafe keyed hashes, use HMAC | root labs rdist</title>
    <link rel="alternate" href="http://rdist.root.org/2009/10/29/stop-using-unsafe-keyed-hashes-use-hmac/"/>
    <id>5f7c020c02319b5ab4d23d8603ba9a7e</id>
    <published>2014-09-19T12:03:29-04:00</published>
    <updated>2014-09-19T12:03:29-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Stop using unsafe keyed hashes, use HMAC | root labs rdist</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Crypto Stick | The single key for your digital life.</title>
    <link rel="alternate" href="https://www.crypto-stick.com/"/>
    <id>3f66cecebe182d985b001462d6f1cc5a</id>
    <published>2014-02-02T16:56:17-05:00</published>
    <updated>2014-02-02T16:56:17-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Crypto Stick | The single key for your digital life.</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Open WhisperSystems &gt;&gt; Open WhisperSystems</title>
    <link rel="alternate" href="https://whispersystems.org/"/>
    <id>9b5ee1f545d42b2142cbb00e011bfd98</id>
    <published>2014-01-26T22:38:02-05:00</published>
    <updated>2014-01-26T22:38:02-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Open WhisperSystems &gt;&gt; Open WhisperSystems</summary>
    <content type="html">RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.</content>
  </entry>
  <entry>
    <title>CCC-TV - 30C3 (1/4)</title>
    <link rel="alternate" href="http://media.ccc.de/browse/congress/2013/"/>
    <id>9bd703ca13541106e7e7d6f80cca829b</id>
    <published>2014-01-26T22:36:46-05:00</published>
    <updated>2014-01-26T22:36:46-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">CCC-TV - 30C3 (1/4)</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>NSA Communicators - NSA/CSS</title>
    <link rel="alternate" href="http://www.nsa.gov/public_info/declass/cryptologs.shtml"/>
    <id>aef4c6abe9301343aa7c25dc5bcda873</id>
    <published>2013-03-27T14:02:04-04:00</published>
    <updated>2013-03-27T14:02:04-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">NSA Communicators - NSA/CSS</summary>
    <content type="html">The National Security Agency has released an archive of back issues of Cryptolog, its secret, in-house magazine, in a repository spanning 1974 to 1997. 
</content>
  </entry>
  <entry>
    <title>Simtec Electronics Entropy Key: USB True Random Number Generator</title>
    <link rel="alternate" href="http://www.entropykey.co.uk/"/>
    <id>e82f6593d8fca958ae03f294e29a3487</id>
    <published>2012-10-11T22:03:05-04:00</published>
    <updated>2012-10-11T22:03:05-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Simtec Electronics Entropy Key: USB True Random Number Generator</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>CloudCracker :: Online Hash Cracker</title>
    <link rel="alternate" href="https://www.cloudcracker.com/"/>
    <id>2e220755da26d277f75418c3bdf94bf3</id>
    <published>2012-09-24T23:37:25-04:00</published>
    <updated>2012-09-24T23:37:25-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">CloudCracker :: Online Hash Cracker</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Philadelphia - CryptoParty</title>
    <link rel="alternate" href="https://cryptoparty.org/wiki/Philadelphia"/>
    <id>14c946c3faa122f91927b27f2372e276</id>
    <published>2012-09-22T18:45:28-04:00</published>
    <updated>2012-09-22T18:45:28-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Philadelphia - CryptoParty</summary>
    <content type="html">Philadelphia CryptoParty is a chance to meet other people interested in cryptography and computer security. The event will be open to those wanting to learn, teach, or a little of both. There are no prerequisites - if you know absolutely nothing (or absolutely everything) about cryptography this is the event for you. All are welcome!</content>
  </entry>
  <entry>
    <title>Whitepixel breaks 28.6 billion password/sec - Zorinaq</title>
    <link rel="alternate" href="http://blog.zorinaq.com/?e=42"/>
    <id>1278bee0ef73100f9215f65b75bda832</id>
    <published>2011-06-17T11:39:10-04:00</published>
    <updated>2011-06-17T11:39:10-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Whitepixel breaks 28.6 billion password/sec - Zorinaq</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>HDCP MASTER KEY (MIRROR THIS T - HDCP Master Key - kqD56TmU - Pastebin.com</title>
    <link rel="alternate" href="http://pastebin.com/kqD56TmU"/>
    <id>f1920d5fe5e29d829645c62a2067b166</id>
    <published>2010-09-17T09:10:09-04:00</published>
    <updated>2010-09-17T09:10:09-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">HDCP MASTER KEY (MIRROR THIS T - HDCP Master Key - kqD56TmU - Pastebin.com</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Cryptographic Right Answers</title>
    <link rel="alternate" href="http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html"/>
    <id>6db99978a0ae3bfa6d34dc783de6cd8f</id>
    <published>2010-06-14T17:18:14-04:00</published>
    <updated>2010-06-14T17:18:14-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Cryptographic Right Answers</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>FM 34-40-2 Basic Cryptanalysis</title>
    <link rel="alternate" href="http://www.umich.edu/~umich/fm-34-40-2/"/>
    <id>79d4968cea32558cee6c514d06888f64</id>
    <published>2008-11-29T17:52:15-05:00</published>
    <updated>2008-11-29T17:52:15-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">FM 34-40-2 Basic Cryptanalysis</summary>
    <content type="html"/>
  </entry>
</feed>
