|
FakeIACR
@
FakeIACR
North Korea
|
|
This is the official twitter account for the FakeIACR organization.
|
|
|
1.153
Tweetovi
|
13
Pratim
|
1.549
Osobe koje vas prate
|
| Tweetovi |
|
FakeIACR
@FakeIACR
|
28. sij |
|
Avoid businesses under the NSA's/FISA's jurisdiction? twitter.com/NSAGov/status/…
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
24. sij |
|
NSA to offer solving "Chain of Fools" by adding rotate lefy by 1.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
24. sij |
|
Nope. But they are FIPS-140 complaint.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
23. sij |
|
Counting in base 9?
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
19. sij |
|
Shame! Shame! Shame!
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
19. sij |
|
Have you tried to make it RO?
We'll be leaving with you then.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
19. sij |
|
Reviewing is the path to the dark side. Reviewing leads to anger. Anger leads to hate. Hate leads to suffering. Suffering leads to Reviewer #2.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
18. sij |
|
Introducing the IND-RWC security notion for security notions that are indistinguishable from real world, IND-RO that looks like a random oracle produced the security notion, and IND-TRNG, a security notion generated by flipping coins.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
17. sij |
|
Apparently, this entire CVE-2020-0601 mess would have been solved if Microsoft insisted on using signed integers rather than unsigned ones in their code base.
Sign your variables!
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
17. sij |
|
Cryptographic CVE's are the RWC equivalent of IACR's eprint.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
16. sij |
|
Meeting will be called MIXeveNTs.
#Sorry
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
16. sij |
|
FakePETS to announce a new support group: AA - Anonymizers Anonymous, for people who are addicted to research in anonymization technologies.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
16. sij |
|
Following CVE-2020-0601, the FakeIACR condemns the use of ECC in certificates and protocols and urges the public to switch to RSA and regular Zp discrete logarithms.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
15. sij |
|
#New #FakeEprintReport "FHE for certificate validation in kernel space" by M Research and N SA
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
13. sij |
|
When you have reflections on reflection, but no reflection in the mirror you are sent to the house of TCC.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
13. sij |
|
When you start your career in IACR's world, you need to go through the sorting mirror. You gaze upon it. If you are a symmetric person, you're sent to the FSE house. If you are asymmetric person, PKC house. When you start measuring your reflection, you are sent to the CHES house>
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
13. sij |
|
You arrive at CRYPTO. There are two tracks. One deals with real life. The second one models real life.
Track A: you are allowed only one query to one of the track oracles to determine which of us is which with non-negligible advantage. What is your query?
You: No need to.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
12. sij |
|
Shamir to admit his secret sharing scheme was inspired by Catch 22's M&Ms enterprises where everyone has a share.
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
11. sij |
|
And 2023 in UCSB! twitter.com/cryptodavidw/s…
|
||
|
|
||
|
FakeIACR
@FakeIACR
|
11. sij |
|
No. Real cryptography tends to deal with binary values.
|
||
|
|
||