displaying 1 - 25 articles in total 249973
# Title Published at
1 Beyond public key encryption 2017-07-02 17:28:56
2 Patching is hard; so what? 2017-09-16 00:21:39
3 Falling through the KRACKs 2017-10-16 15:27:10
4 A few thoughts on CSRankings.org 2017-11-08 17:28:43
5 Attack of the week: DUHK 2017-10-23 20:28:10
6 The strange story of “Extended Random” 2017-12-19 21:22:21
7 Attack of the Week: Group Messaging in WhatsApp and Signal 2018-01-10 15:01:43
8 Apple in China: who holds the keys? 2018-01-16 20:44:56
9 A few notes on Medsec and St. Jude Medical 2018-02-17 19:27:22
10 Hash-based Signatures: An illustrated Primer 2018-04-07 17:41:50
11 Wonk post: chosen ciphertext security in public-key encryption (Part 1) 2018-04-21 17:40:52
12 A few thoughts on Ray Ozzie’s “Clear” Proposal 2018-04-26 14:26:40
13 Was the Efail disclosure horribly screwed up? 2018-05-17 21:06:53
14 Wonk post: chosen ciphertext security in public-key encryption (Part 2) 2018-07-20 17:49:37
15 Let’s talk about PAKE 2018-10-19 19:58:56
16 Why I’m done with Chrome 2018-09-23 22:01:40
17 On Ghost Users and Messaging Backdoors 2018-12-17 23:20:59
18 Attack of the week: searchable encryption and the ever-expanding leakage function 2019-02-11 17:41:51
19 How does Apple (privately) find your offline devices? 2019-06-05 21:29:15
20 Looking back at the Snowden revelations 2019-09-24 22:12:37
21 How safe is Apple’s Safe Browsing? 2019-10-13 17:49:08
22 On client-side media scanning 2019-12-08 16:52:07
23 Secure computing for journalists 2017-03-05 19:38:21
24 Android N Encryption 2016-11-24 15:09:47
25 The future of Ransomware 2017-02-28 01:47:29