This is a brief post sketching out a synthetic style of cryptography. In this style, one doesn’t appeal to any kind of complexity theory, probability, or even adversary.

- 2023年06月22日
- 27 分

A Sketch of Synthetic Cryptography- 2023年03月09日
- 10 分

Some Bits about Cait-SithRecently, I’ve been working on a threshold ECDSA protocol—and its implementation—called Cait-Sith. I thought I might write a little blog post to talk about it.

- 2023年02月19日
- 13 分

Cryptography without SecurityThe typical presentation of theoretical cryptography has one central goal: defining what it means for cryptographic objects to be “secure”. I think this goal is misguided.

- 2022年10月09日
- 15 分

DKGs in GroupsThis is a short post on

*distributed key generation*(DKG) in the context of cryptographic groups, such as elliptic curves.- 2022年09月25日
- 11 分

Notes on STARK ArithmetizationI’ve been playing around with STARKs lately, meandering my way towards a toy implementation.

- 2022年08月21日
- 23 分

The Paper that Keeps Showing UpLet’s talk about one of my favorite cryptography papers.

- 2022年08月14日
- 35 分

Some KEMs and Some ProofsIn this post, I’d like to provide a technical introduction to key encapsulation mechanisms (KEMs), with a focus on proving the security of various constructions.

- 2022年07月16日
- 8 分

Basic Cryptography Without FluffMany topics in cryptography on this blog so far, but not many basic topics. This post is a crack at providing such an approach. With luck, it should bring utility to unfamiliar folk, but also grins for folk familiar with this art.

- 2022年06月26日
- 12 分

On Identifiable AbortsMany cryptographic protocols attempt to satisfy a notion of “identifiable abort”, where if a malicious party causes the protocol to prematurely halt, then they can be detected. In practice, I think that this notion isn’t all that useful.

- 2022年05月28日
- 43 分

State-Separable Proofs for the Curious CryptographerThis blog post is an introduction to

*state-separable*proofs, a technique for proving the security of Cryptographic schemes.- 2022年05月14日
- 13 分

Some Cryptography Books I LikeThis is just a brief post going over a few books on Cryptography I’ve read, and would potentially recommend to people interested in the topic.

- 2022年05月01日
- 13 分

Explaining Yao's Garbled CircuitsThe protocol so fun you have to implement it! Like I did recently.

- 2022年04月23日
- 14 分

Canetti et al's Paradoxical Encryption SchemeWhen proving security, Cryptographers often model hash functions as random oracles, which act like random functions. In practice, hash functions are different from random oracles. The question is: does this difference impact security?

- 2022年03月07日
- 12 分

On Monero's Ring SignaturesMonero is a cryptocurrency which claims to be “private, and decentralized”. One of Monero’s main tools towards this privacy is the ring signature. Ring signatures allow you to sign on behalf of a group, without revealing which member of the group you are. They can be constructed as an elegant extension of Schnorr signatures, and aren’t all that hard to understand either.

- 2022年02月06日
- 9 分

On the Malleability of ECDSA SignaturesThe ECDSA signature scheme is quite ubiquitous, used everywhere from TLS to various cryptocurrencies like Bitcoin. Funnily enough, it turns out that it suffers from a few

*malleability*issues, although I doubt these pose a serious issue in practice.- 2021年09月03日
- 2 分

My Quick Attempt at Bluesky's Satellite ChallengeTwitter’s Bluesky initiative created a little challenge where the goal was to verifiably link different digital identities together. This is my attempt at this.

- 2021年08月03日
- 5 分

Taproot Signatures and BIP-32How do Bitcoin’s new Taproot signatures interact with the good old key derivation methods from BIP-32? It turns out that the answer isn’t all that straightforward.

- 2021年07月25日
- 9 分

On Multi-Set HashingDesigning a hash function where the order of inputs doesn’t matter is surprisingly easy.

- 2021年07月10日
- 13 分

Signatures From Identification SchemesIt turns out that all you need to make a signature scheme is a way to prove your identity.

- 2021年07月05日
- 15 分

Introducing NuntiusRecently, I made a toy E2E encrypted messanger, called Nuntius. I had fun tinkering on it, and thought that some of the cryptography involved would be fun to explain.

- 2021年06月20日
- 11 分

End-to-End Encryption in Web AppsEnd-to-end encryption is a very appealing guarantee of privacy, and more applications want to provide this guarantee. Web applications are popular, and they want to implement this functionality in the browser. What kind of guarantees does a user still have with a web app, served to them dynamically?

- 2021年06月06日
- 17 分

Introducing NimotsuRecently, I’ve been working on a little encryption tool called Nimotsu. My goal with this project was to implement all of the cryptographic primitives involved. I had a lot of fun doing so, and thought it would make for an interesting blog post.

- 2021年04月05日
- 23 分

Constant-Time Big Numbers: An IntroductionOver the past couple months, I’ve been working on a library for constant-time Big Numbers in Go. I think it’s about time that I presented a bit of this work.