- Authenticated Dictionaries with Skip Lists and Commutative Hashing
by kkl on 1/5/20, 10:08 PM, with comments
- RSA-Based Key Encapsulation Mechanisms
by kkl on 5/27/19, 5:50 PM, with comments
- Building lattice reduction (LLL) intuition
by kkl on 7/25/17, 1:33 PM, with comments
- The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem
by kkl on 4/26/17, 3:50 AM, with comments
- Some challenges in post-quantum standardization
by kkl on 10/31/16, 1:56 AM, with comments
- Why PKCS#1v1.5 Signature Should (Also) Be Put Out of Our Misery
by kkl on 8/9/16, 11:20 PM, with comments
- Executing non-alphanumeric JavaScript without parentheses
by kkl on 7/15/16, 2:57 PM, with comments
- Encrypted Email Obstacles and Experiments
by kkl on 6/13/16, 12:18 AM, with comments
- Web Storage: the lesser evil for session tokens
by kkl on 5/31/16, 2:20 PM, with comments
- Security challenges for the Qubes build process
by kkl on 5/30/16, 1:03 PM, with comments
- BLESS: SSH Certificate Authority for Ephemeral SSH Sessions
by kkl on 5/21/16, 10:17 PM, with comments
- Signal Protocol and Deniable Authentication
by kkl on 5/17/16, 7:43 PM, with comments
- A Systematic Analysis of the Juniper Dual EC Incident
by kkl on 4/15/16, 7:26 PM, with comments
- Scalable vendor security reviews
by kkl on 3/7/16, 8:14 PM, with comments
- Go Proverbs Illustrated
by kkl on 1/3/16, 3:37 PM, with comments
- Duplicate Signature Key Selection Attack in Let's Encrypt
by kkl on 12/12/15, 4:10 PM, with comments
- Duplicate Signature Key Selection Attack in Let's Encrypt
by kkl on 12/2/15, 6:32 PM, with comments
- Secure Password Hash Algorithm Migrations
by kkl on 11/27/15, 3:25 AM, with comments