cr.yp.to blog

D. J. Bernstein's personal weblog.
http://blog.cr.yp.to/ (RSS)
visit blog
The sins of the 90s
28 Oct 2024 | original ↗

Questioning a puzzling claim about mass surveillance. #attackers #governments #corporations #surveillance #cryptowars

Clang vs. Clang
3 Aug 2024 | original ↗

You're making Clang angry. You wouldn't like Clang when it's angry. #compilers #optimization #bugs #timing #security #codescans

Plagiarism as a patent amplifier
21 Jul 2024 | original ↗

Understanding the delayed rollout of post-quantum cryptography. #pqcrypto #patents #ntru #lpr #ding #peikert #newhope

Bibliography keys
6 Jul 2024 | original ↗

It's as easy as [1], [2], [3]. #bibliographies #citations #bibtex #votemanipulation #paperwriting

NSA, NIST, and post-quantum cryptography
8 Mar 2024 | original ↗

Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia

Double encryption
9 Jan 2024 | original ↗

Analyzing the NSA/GCHQ arguments against hybrids. #nsa #quantification #risks #complexity #costs

Another way to botch the security analysis of Kyber-512
23 Dec 2023 | original ↗

Responding to a recent blog post. #nist #uncertainty #errorbars #quantification

The inability to count correctly
30 Oct 2023 | original ↗

Debunking NIST's calculation of the Kyber-512 security level. #nist #addition #multiplication #ntru #kyber #fiasco

Reducing "gate" counts for Kyber-512
23 Oct 2023 | original ↗

Two algorithm analyses, from first principles, contradicting NIST's calculation. #xor #popcount #gates #memory #clumping

How to design an elliptic-curve signature system
23 Oct 2023 | original ↗

There are many choices of elliptic-curve signature systems. The standard choice, ECDSA, is reasonable if you don't care about simplicity, speed, and security. #signatures #ecc #elgamal #schnorr #ecdsa #eddsa #ed25519

Turbo Boost
9 Jun 2023 | original ↗

How to perpetuate security problems. #overclocking #performancehype #power #timing #hertzbleed #riskmanagement #environment

Entropy Attacks!
17 Mar 2023 | original ↗

The conventional wisdom says that hash outputs can't be controlled; the conventional wisdom is simply wrong.

A subfield-logarithm attack against ideal lattices
9 Jan 2022 | original ↗

Computational algebraic number theory tackles lattice-based cryptography.

NIST's cryptographic standardization process
9 Jan 2022 | original ↗

The first step towards improvement is to admit previous failures. #standardization #nist #des #dsa #dualec #nsa

Some small suggestions for the Intel instruction set
9 Jan 2022 | original ↗

Low-cost changes to CPU architecture would make cryptography much safer and much faster. #constanttimecommitment #vmul53 #vcarry #pipelinedocumentation

The Saber cluster
9 Jan 2022 | original ↗

How we built a cluster capable of computing 3000000000000000000000 multiplications per year for just 50000 EUR. #nvidia #linux #howto

Follow-You Printing
9 Jan 2022 | original ↗

How Equitrac's marketing department misrepresents and interferes with your work. #equitrac #followyouprinting #dilbert #officespaceprinter

The death of optimizing compilers
9 Jan 2022 | original ↗

Abstract of my tutorial at ETAPS 2015. #etaps #compilers #cpuevolution #hotspots #optimization #domainspecific #returnofthejedi

Break a dozen secret keys, get a million more for free
9 Jan 2022 | original ↗

Batch attacks are often much more cost-effective than single-target attacks. #batching #economics #keysizes #aes #ecc #rsa #dh #logjam

Thomas Jefferson and Apple versus the FBI
9 Jan 2022 | original ↗

Can the government censor how-to books? What if some of the readers are criminals? What if the books can be understood by a computer? An introduction to freedom of speech for software publishers. #censorship #firstamendment #instructions #software #encryption

Security fraud in Europe's "Quantum Manifesto"
9 Jan 2022 | original ↗

How quantum cryptographers are stealing a quarter of a billion Euros from the European Commission. #qkd #quantumcrypto #quantummanifesto

The death of due process
9 Jan 2022 | original ↗

A few notes on technology-fueled normalization of lynch mobs targeting both the accuser and the accused. #ethics #crime #punishment

Benchmarking post-quantum cryptography
9 Jan 2022 | original ↗

News regarding the SUPERCOP benchmarking system, and more recommendations to NIST. #benchmarking #supercop #nist #pqcrypto

Quantum algorithms to find collisions
9 Jan 2022 | original ↗

Analysis of several algorithms for the collision problem, and for the related multi-target preimage problem. #collision #preimage #pqcrypto

Reconstructing ROCA
9 Jan 2022 | original ↗

A case study of how quickly an attack can be developed from a limited disclosure. #infineon #roca #rsa

Why EdDSA held up better than ECDSA against Minerva
9 Jan 2022 | original ↗

Cryptosystem designers successfully predicting, and protecting against, implementation failures. #ecdsa #eddsa #hnp #lwe #bleichenbacher #bkw

Optimizing for the wrong metric, part 1: Microsoft Word
9 Jan 2022 | original ↗

Review of "An Efficiency Comparison of Document Preparation Systems Used in Academic Research and Development" by Knauff and Nejasmic. #latex #word #efficiency #metrics

An introduction to vectorization
30 Apr 2019 | original ↗

Understanding one of the most important changes in the high-speed-software ecosystem. #vectorization #sse #avx #avx512 #antivectors

Fast-key-erasure random-number generators
26 Jul 2017 | original ↗

An effort to clean up several messes simultaneously. #rng #forwardsecrecy #urandom #cascade #hmac #rekeying #proofs

Some challenges in post-quantum standardization
30 Oct 2016 | original ↗

My comments to NIST on the first draft of their call for submissions. #standardization #nist #pqcrypto

↑ these items are from RSS. Visit the blog itself at http://blog.cr.yp.to/ to find other articles and to appreciate the author's digital home.