Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.cryptographyengineering.com

A Few Thoughts on Cryptographic Engineering

Get the latest updates from A Few Thoughts on Cryptographic Engineering directly as they happen.

Follow now 394 followers

Latest posts

Last updated 2 days ago

How to prove false statements? (Part 3)

2 days ago

This is the third and penultimate post in a series about theoretical...

U.K. asks to backdoor iCloud Backup encryption

10 days ago

I’m supposed to be finishing a wonky series on proof systems (here...

How to prove false statements? (Part 2)

15 days ago

This is the second part of a two three-part series, which covers...

How to prove false statements? (Part 1)

17 days ago

Trigger warning: incredibly wonky theoretical cryptography post (written by a non-theorist)! I...

Let’s talk about AI and end-to-end encryption

about 1 month ago

Recently I came across a fantastic new paper by a group of...

Is Telegram really an encrypted messaging app?

6 months ago

This blog is reserved for more serious things, and ordinarily I wouldn’t...

A quick post on Chen’s algorithm

10 months ago

If you’re a normal person — that is, a person who doesn’t...

Book Review: Red Team Blues

almost 2 years ago

As a rule, book reviews are not a thing I usually do...

Remarks on “Chat Control”

almost 2 years ago

On March 23 I was invited to participate in a panel discussion...

Apple iCloud, and why encrypted backup is the only issue

about 2 years ago

You might have seen the news today that Apple is announcing a...

One-Time Programs

over 2 years ago

One of the things I like to do on this blog is...

In defense of crypto(currency)

over 2 years ago

Last week a group of technologists, including Bruce Schneier, sent a letter...