Twitter | Pretraživanje | |
chelsea h. komlo
Cryptography, privacy, and distributed systems research and implementation. She/her
2.880
Tweetovi
726
Pratim
3.430
Osobe koje vas prate
Tweetovi
chelsea h. komlo 3 h
Odgovor korisniku/ci @ciphergoth @alexcryptan i 21 ostali
Hm! Interesting. Symmetric ciphers are not my expertise but I actually think structure can be useful for analysis purposes about the security of a scheme in general
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 3. velj
Odgovor korisniku/ci @realwolfpupy
What a charmer :)
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 2. velj
Odgovor korisniku/ci @rival_elf
So many terrible pick up lines could be made from this
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 2. velj
Odgovor korisniku/ci @CryptoBits_eu
Yes, our work makes similar points on existing problems of secret sharing primitives as presented by Rogaway et al. I really liked their formalization of secret sharing akin to symmetric encryption; that’s the right lens to define required security properties imo
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 2. velj
Odgovor korisniku/ci @CryptoBits_eu
Definitely don’t feel bad! Ask away :)
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 2. velj
Odgovor korisniku/ci @MarkOnPhDuty
Thanks, that is great to hear!
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 1. velj
Odgovor korisniku/ci @bkacsmar
Also working with was the best, 14/10 can’t wait to find an excuse to again :)
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 1. velj
Excited for our paper “Mind the Gap: Ceremonies for Applied Secret Sharing” to be in this issue! We assess the security of several common secret sharing use cases and provide recommendations for secure constructions
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 1. velj
Odgovor korisniku/ci @matthew_d_green
❤️ that bow tie
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 28. sij
Odgovor korisniku/ci @AmberBaldet
But yes to everything else
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 28. sij
Odgovor korisniku/ci @AmberBaldet
Wait I missed the tail part, not so sure about the tail
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 28. sij
Odgovor korisniku/ci @AmberBaldet
14/10 would wear all the time
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 23. sij
Odgovor korisniku/ci @isislovecruft
🖤
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 23. sij
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 16. sij
Alternatively: Let PK be the victim’s pub key and G be the generator, where PK=sG (s is the secret). Attack: 1. Pick a t modulo the order of G, 2. Compute G’ = (t^(-1))*P, 3. Publish a cert where the public key is PK and the generator is G’. Success when PK is validated but not G
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 16. sij
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 16. sij
Odgovor korisniku/ci @sjmurdoch
I love these updates :)
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 15. sij
Odgovor korisniku/ci @isislovecruft
🖤 that SIDH 🦖
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 15. sij
Odgovor korisniku/ci @SmartCryptology
Fair (I know there are a number of such books); having several different presentations of this material is helpful, at least to me.
Reply Retweet Označi sa "sviđa mi se"
chelsea h. komlo 15. sij
It can be hard to find good introductions to the mathematical theory of elliptic curves; these course notes are quite good
Reply Retweet Označi sa "sviđa mi se"