blog.bjrn.se
Programming and stuff.
Pages
(Move to ...)
Home
▼
Saturday, January 04, 2020
Non-realtime publishing for censorship resistance
›
“Because the Internet is so new, we still don't really understand what it is. We mistake it for a type of publishing or broadcasting, be...
Saturday, August 13, 2016
Cabinet of curiosities: A bunch of cryptographic protocol oddities
›
In this short trivia article I will list a few unusual cryptographic design choices in some real applications/protocols. Specifically, I wil...
Wednesday, December 23, 2015
I challenge you to compute this: Specializing BREACH and Cross-Site Search attacks to steal private keywords
›
In the real world there are many cases when we are more interested in how well a system protects a few specific keywords, rather than how we...
Tuesday, July 07, 2015
Let’s construct an elliptic curve: Introducing Crackpot2065
›
This article is meant to demystify some aspects of elliptic curve cryptography. The target audience is people who already have a basic und...
›
Home
View web version