#OpenSSLNTRU preprint is now available on #ePrint https://ia.cr/2021/826 and arXiv https://arxiv.org/abs/2106.08759.
NTRU Prime implementation & integration for servers & clients via #OpenSSL: post-quantum key exchange at new record speed.
Try the demo yourself: https://opensslntru.cr.yp.to
RT @luca_defeo@twitter.com
IBM's got talent (aye, aye)
The Pirates of the CSIDH salute ye, @KhanhCrypto@twitter.com, Maxime (and extras Sebastian, @BootleJonathan@twitter.com, Patrick, Vadim, @gregor_seiler@twitter.com)
🐦🔗: https://twitter.com/luca_defeo/status/1558044287748775941
RT @PurnalToon@twitter.com
It is 2022, and your computer now runs at 3 MHz.
“Do you mean 3 GHz?”
Nope! A malicious hyperthread can make shared libraries run up to ~1000x slower, resulting in a huge SNR boost for side-channel attacks.
[HyperDegrade, by @acaldaya@twitter.com] #usesec22
🐦🔗: https://twitter.com/PurnalToon/status/1557825749842857984
RT @tqbf@twitter.com
I’m a sucker for vuln research like this. The team found a cool bug (the APIC fails to zero out the full 16 bytes of a buffer used to satisfy a 4-byte read, and so leaks cached data in the unused 12 bytes). But what’s cool is how they did it.
RT @borrello_pietro@twitter.com
Today we disclose ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture 🔥
It is the *first* architectural CPU bug able to leak sensitive data from the cache hierarchy: like an uninitialized read but in the CPU itself.
🐦🔗: https://twitter.com/borrello_pietro/status/1557065793954672640
RT @hashbreaker@twitter.com
New blog post "NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government." https://blog.cr.yp.to/20220805-nsa.html Case filed in federal court today by @LoevyAndLoevy@twitter.com. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia
🐦🔗: https://twitter.com/hashbreaker/status/1555625577989541888
RT @campuscodi@twitter.com
Google has open-sourced a new tool called Paranoid that can be used to check for well-known weaknesses in cryptographic artifacts such as public keys, digital signatures, and general pseudorandom numbers
https://github.com/google/paranoid_crypto
🐦🔗: https://twitter.com/campuscodi/status/1555312451679387648
RT @jjchidguez@twitter.com
I share with you the released version of sibc!
Thanks to the contributors for the speedups on the library.
You can play with a faster csidh (in python)
PS. We added some links and comments concerning Castryck-Decru's attack!
https://pypi.org/project/sibc/
https://github.com/JJChiDguez/sibc
🐦🔗: https://twitter.com/jjchidguez/status/1555491767302094849
RT @SPIRSProject@twitter.com
Watch our new promotional video! #H2020 #SPIRS
🐦🔗: https://twitter.com/SPIRSProject/status/1555093680041738242
#NordSec 2022 submission deadline is 22 Aug (AoE)!
27th Nordic Conference on Secure IT Systems,
30 Nov—2 Dec, Reykjavik University, Iceland.
https://nordsec2022.ru.is/
RT @EllipticKiwi@twitter.com
Blog post on the SIDH attack
https://ellipticnews.wordpress.com/2022/07/31/breaking-supersingular-isogeny-diffie-hellman-sidh/
🐦🔗: https://twitter.com/EllipticKiwi/status/1553670236628729856
RT @hashbreaker@twitter.com
NIST's latest report (1) says NIST is confident in the security of Kyber; (2) says Kyber-512 >= AES-128; (3) says Kyber-768 >= AES-192. But attack advances keep reducing lattice security levels! It will be completely unsurprising if the next round of attacks falsifies #2 and #3.
🐦🔗: https://twitter.com/hashbreaker/status/1548359451752640520
RT @KrijnReijnders@twitter.com
Kyber is the new PQC KEM! If you wonder how it works, but are a bit afraid of lattices, Ruben Gonzalez and I have you covered: just watch our video at CCC, in which we explain all you need to know: https://media.ccc.de/v/rc3-2021-cwtv-230-kyber-and-post-quantum
🐦🔗: https://twitter.com/KrijnReijnders/status/1546756046282231808
RT @jmkorhonen@twitter.com
Of all the ways to organize an industrial society that humans have tried so far, the Nordic social democracy is the least bad. Not perfect and in dire need of improvement, but still least bad.
Here's where Finland for instance shines: a thread.
🐦🔗: https://twitter.com/jmkorhonen/status/1543874450432688129
RT @hashbreaker@twitter.com
New resource page available on timing attacks, including recommendations for action to take regarding overclocking attacks such as #HertzBleed: https://timing.attacks.cr.yp.to Don't wait for the next public overclocking attack; take proactive steps to defend your data against compromise.
🐦🔗: https://twitter.com/hashbreaker/status/1539123289624391680
RT @SPIRSProject@twitter.com
Today we are in Tampere and online for the third regular meeting! Thanks @NISEC_TAU@twitter.com for hosting us!
🐦🔗: https://twitter.com/SPIRSProject/status/1536966447334928385
RT @BroxPiedad@twitter.com
Happy to be in Tampere with our partners in @SPIRSProject@twitter.com . Thanks to @NISEC_TAU@twitter.com for hosting us!
🐦🔗: https://twitter.com/BroxPiedad/status/1537092496400039940
RT @davidalqabri@twitter.com
A very productive meeting at Tampere. We have got a solid basis and better companions to get a very successful project. Cheers for @SPIRSProject@twitter.com
🐦🔗: https://twitter.com/davidalqabri/status/1537538155888488458
RT @SPIRSProject@twitter.com
Yesterday we finished the day with a very nice dinner. Right now, we are back to work! Here we go! https://www.instagram.com/p/Ce2zUySrJR7/?igshid=YTgzYjQ4ZTY=
🐦🔗: https://twitter.com/SPIRSProject/status/1537322788108869632
RT @sochubfi@twitter.com
The first SoC Hub chip "Ballast" is here and tested to be functional! #systemonchip #cocreation https://sochub.fi/the-first-soc-hub-chip-is-being-tested-in-tampere-soon-to-be-followed-by-demo-applications/
Developer, Linux user, Doctoral Candidate @ Tampere University 🇫🇮, OTC Member @ OpenSSL