blog.bjrn.se

Programming and stuff.

Pages

▼
Saturday, January 04, 2020

Non-realtime publishing for censorship resistance

›
“Because the Internet is so new, we still don't really understand what it is. We mistake it for a type of publishing or broadcasting, be...
Saturday, August 13, 2016

Cabinet of curiosities: A bunch of cryptographic protocol oddities

›
In this short trivia article I will list a few unusual cryptographic design choices in some real applications/protocols. Specifically, I wil...
Wednesday, December 23, 2015

I challenge you to compute this: Specializing BREACH and Cross-Site Search attacks to steal private keywords

›
In the real world there are many cases when we are more interested in how well a system protects a few specific keywords, rather than how we...
Tuesday, July 07, 2015

Let’s construct an elliptic curve: Introducing Crackpot2065

›
This article is meant to demystify some aspects of elliptic curve cryptography. The target audience is people who already have a basic und...
›
Home
View web version

Contributors

  • Björn Edström
  • Björn Edström
Powered by Blogger.