Twitter | Pretraživanje | |
Jake Massimo
PhD Student in Cyber Security at Royal Holloway, University of London. Supervised by . Slowly turning tea into a thesis.
61
Tweetovi
142
Pratim
264
Osobe koje vas prate
Tweetovi
Jake Massimo proslijedio/la je tweet
kennyog 22. sij
Coming soon to OpenSSL: a simple, safe and performant API for primality testing. With , and with thanks to Kurt Roeckx from OpenSSL and who posed the question.
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
Fermat's Library 20. stu
Start with 82 and go backwards to 1 8281807978777675747372717069686 7666564636261605958575655545352 5150494847464544434241403938373 6353433323130292827262524232221 2019181716151413121110987654321 ...this number is prime!
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
Amazon Web Services 18. stu
Wondering about security in a post-quantum world? Post-quantum TLS is now supported in AWS KMS.
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 18. lis
Odgovor korisniku/ci @qoda @yestinj @abbyfuller
sorry I couldn’t help myself
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
Martin R. Albrecht 7. lis
The list of accepted presentations for IMA CC 2019 is out: Now is a good time to register
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 4. lis
Always enjoy reading Craig’s work!
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 13. ruj
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 18. kol
A Brute-Force attack IRL (from r/specializedtools )
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
Eva 17. kol
I'm "2400 baud handshake noise" years old.
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 15. kol
Odgovor korisniku/ci @yayworthy @ISGnews i 4 ostali
Congrats!! What courses will you be teaching?!
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
kennyog 15. srp
We made a short video about primality testing - a nice challenge in 90 seconds:
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
kennyog 4. tra
Theory: - malicious DH parameters for OpenSSL. ---> Practice: - increases rounds of Miller-Rabin testing in DH parameter validation. Nice work !
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 14. velj
Odgovor korisniku/ci @cryptodavidw
¯\_(ツ)_/¯ wasn’t me!
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 18. sij 2019.
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. With and available at:
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 16. pro 2018.
Odgovor korisniku/ci @robinhouston @ChrisPeikert
Pretty cool! I’ve never heard of this before. I must say it feels a little strange to me!
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 26. stu 2018.
Nice find Antonio, as you say simple to generate composites that fool the test. Not prize winning, but shouldn't be called upon as a library in it's current state. Couldn't resist, here's a toy example -
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
kennyog 30. lis 2018.
Phew, CVE-2018-4398 is finally out - flaws in Apple's primality testing code in their CoreCrypto library, affecting multiple products and OSes. See Sections 1.3 and 4.8 of our updated paper at: , cc
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 30. lis 2018.
Odgovor korisniku/ci @tqbf @kennyog
It was who first took a look at corecrypto and found the problems there. Then I checked over CommonCrypto and found that things got worse.
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo 30. lis 2018.
I wrote a blog post about our findings in Apple's CommonCrypto (and corecrypto) library with security update now live in macOS Mojave 10.14.1 and iOS 12.1 with
Reply Retweet Označi sa "sviđa mi se"
Jake Massimo proslijedio/la je tweet
Shaanan Cohney 17. lis 2018.
Honoured to present this prestigious award for fantastic research on adversarial primality testing.
Reply Retweet Označi sa "sviđa mi se"