|
chelsea h. komlo
@
chelseakomlo
|
|
Cryptography, privacy, and distributed systems research and implementation. She/her
|
|
|
2.880
Tweetovi
|
726
Pratim
|
3.430
Osobe koje vas prate
|
| Tweetovi |
|
chelsea h. komlo
@chelseakomlo
|
3 h |
|
Hm! Interesting. Symmetric ciphers are not my expertise but I actually think structure can be useful for analysis purposes about the security of a scheme in general
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
3. velj |
|
What a charmer :)
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
2. velj |
|
So many terrible pick up lines could be made from this
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
2. velj |
|
Yes, our work makes similar points on existing problems of secret sharing primitives as presented by Rogaway et al. I really liked their formalization of secret sharing akin to symmetric encryption; that’s the right lens to define required security properties imo
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
2. velj |
|
Definitely don’t feel bad! Ask away :)
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
2. velj |
|
Thanks, that is great to hear!
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
1. velj |
|
Also working with @bkacsmar was the best, 14/10 can’t wait to find an excuse to again :)
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
1. velj |
|
Excited for our paper “Mind the Gap: Ceremonies for Applied Secret Sharing” to be in this issue! We assess the security of several common secret sharing use cases and provide recommendations for secure constructions twitter.com/pet_symposium/…
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
1. velj |
|
❤️ that bow tie
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
28. sij |
|
But yes to everything else
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
28. sij |
|
Wait I missed the tail part, not so sure about the tail
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
28. sij |
|
14/10 would wear all the time
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
23. sij |
|
🖤
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
23. sij |
|
❤️ so great twitter.com/ChrisPeikert/s…
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
16. sij |
|
Alternatively: Let PK be the victim’s pub key and G be the generator, where PK=sG (s is the secret). Attack: 1. Pick a t modulo the order of G, 2. Compute G’ = (t^(-1))*P, 3. Publish a cert where the public key is PK and the generator is G’. Success when PK is validated but not G twitter.com/CasCremers/sta…
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
16. sij |
|
Thread 👇 twitter.com/CasCremers/sta…
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
16. sij |
|
I love these updates :)
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
15. sij |
|
🖤 that SIDH 🦖
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
15. sij |
|
Fair (I know there are a number of such books); having several different presentations of this material is helpful, at least to me.
|
||
|
|
||
|
chelsea h. komlo
@chelseakomlo
|
15. sij |
|
It can be hard to find good introductions to the mathematical theory of elliptic curves; these course notes are quite good math.mit.edu/classes/18.783…
|
||
|
|
||