Twitter’s Bluesky initiative created a little challenge where the goal was to verifiably link different digital identities together. This is my attempt at this.

 September 03, 2021
 2 minutes
My Quick Attempt at Bluesky's Satellite Challenge 
 August 03, 2021
 5 minutes
Taproot Signatures and BIP32How do Bitcoin’s new Taproot signatures interact with the good old key derivation methods from BIP32? It turns out that the answer isn’t all that straightforward.

 July 25, 2021
 9 minutes
On MultiSet HashingDesigning a hash function where the order of inputs doesn’t matter is surprisingly easy.

 July 10, 2021
 13 minutes
Signatures From Identification SchemesIt turns out that all you need to make a signature scheme is a way to prove your identity.

 July 05, 2021
 15 minutes
Introducing NuntiusRecently, I made a toy E2E encrypted messanger, called Nuntius. I had fun tinkering on it, and thought that some of the cryptography involved would be fun to explain.

 June 20, 2021
 11 minutes
EndtoEnd Encryption in Web AppsEndtoend encryption is a very appealing guarantee of privacy, and more applications want to provide this guarantee. Web applications are popular, and they want to implement this functionality in the browser. What kind of guarantees does a user still have with a web app, served to them dynamically?

 June 06, 2021
 16 minutes
Introducing NimotsuRecently, I’ve been working on a little encryption tool called Nimotsu. My goal with this project was to implement all of the cryptographic primitives involved. I had a lot of fun doing so, and thought it would make for an interesting blog post.

 April 05, 2021
 23 minutes
ConstantTime Big Numbers: An IntroductionOver the past couple months, I’ve been working on a library for constanttime Big Numbers in Go. I think it’s about time that I presented a bit of this work.