InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSELiving With A Dictator: Anamorphic CryptographyLast week, I spent an amazing hour speaking with the mighty Moti Yung [here], and who outlined the usage of anamorphic cryptography:Apr 19A response icon3
Prof Bill Buchanan OBE FRSETSPs, e-ID, e-IDAS 2 and the UK Digital WalletBuilding houses and then adding the foundationsApr 19A response icon4
Prof Bill Buchanan OBE FRSEThe Three Protocols That Could Bring Down The Internet (And Life as We Know It): DNS, PKI and BGPWith the shutdown of Heathrow for a day, many people are talking about resilience in our critical national infrastructure, and one of the…Apr 12A response icon13Apr 12A response icon13
Prof Bill Buchanan OBE FRSEBye-bye Three-way Handshake, and Hello to 0-RTTBut, beware of the Replay AttackApr 8A response icon2Apr 8A response icon2
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEAre There More Electrons in the Universe Than 512-bit Prime Numbers?The answer is No!Mar 21A response icon6Mar 21A response icon6
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSELiving With A Dictator: Anamorphic CryptographyLast week, I spent an amazing hour speaking with the mighty Moti Yung [here], and who outlined the usage of anamorphic cryptography:Apr 19A response icon3
Prof Bill Buchanan OBE FRSETSPs, e-ID, e-IDAS 2 and the UK Digital WalletBuilding houses and then adding the foundationsApr 19A response icon4
Prof Bill Buchanan OBE FRSEThe Three Protocols That Could Bring Down The Internet (And Life as We Know It): DNS, PKI and BGPWith the shutdown of Heathrow for a day, many people are talking about resilience in our critical national infrastructure, and one of the…Apr 12A response icon13
Prof Bill Buchanan OBE FRSEBye-bye Three-way Handshake, and Hello to 0-RTTBut, beware of the Replay AttackApr 8A response icon2
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEAre There More Electrons in the Universe Than 512-bit Prime Numbers?The answer is No!Mar 21A response icon6
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEMobile Phone Networks, RFID and TETRA: The Weakest Links?KUSAMI: Cracked 21 days with 2400 RTX 4090 GPUs with Time-Memory-Trade-Off tables, and 38 hours on 2400 RTX GPUs for a brute force attack.Mar 9
InsadasantbyDaniel RodríguezSecret Thoughts: Privacy for Artificial IntelligenceWhat if your AI could store everything it knows, learn from every interaction, and yet never expose a single secret?Feb 25A response icon4
InInfoSec Write-upsbyTide FoundationI Got 99 Problems, But a Breach Ain’t OneIneffable Cryptography: The science behind a new era of cybersecurityDec 23, 2024A response icon1