Follow-You Printing 18.2.2015 How Equitrac’s marketing department misrepresents and interferes with your work. #equitrac #followyouprinting #dilbert #officespaceprinter… Read More
The Saber cluster 3.6.2014 How we built a cluster capable of computing 3000000000000000000000 multiplications per year for just 50000 EUR. #nvidia #linux #howto… Read More
Some small suggestions for the Intel instruction set 18.5.2014 Low-cost changes to CPU architecture would make cryptography much safer and much faster. #constanttimecommitment #vmul53 #vcarry #pipelinedocumentation… Read More
NIST’s cryptographic standardization process 11.4.2014 The first step towards improvement is to admit previous failures. #standardization #nist #des #dsa #dualec #nsa… Read More
How to design an elliptic-curve signature system 23.3.2014 There are many choices of elliptic-curve signature systems. The standard choice, ECDSA, is reasonable if you don’t care about simplicity, speed, and security. #signatures #ecc #elgamal #schnorr #ecdsa #eddsa #ed25519… Read More
A subfield-logarithm attack against ideal lattices 13.2.2014 Computational algebraic number theory tackles lattice-based cryptography.… Read More
Entropy Attacks! 5.2.2014 The conventional wisdom says that hash outputs can’t be controlled; the conventional wisdom is simply wrong.… Read More