-
It was mentioned during the discussion on #88. Goal: If an attacker steals a key, he/she can impersonate only one side of the communication. Requires: a good JS library for asymmetric crypthography.
…
-
The Robovac 30C (and presumably future models) back off onto Tuya for command and control of the devices. The Eufy integration also uses a new (or custom) URL signing mechanism for Tuya cloud APIs. Al…
-
This is probably an issue with the the numerical calculation of the square root:
```python
>>> from pairing_functions.cantor import pair, unpair
>>> unpair(pair(129315199267255490, 392198719615119)…
-
This is an exhaustive list, not everything is needed
1. All hash functions in https://github.com/coruus/sphlib (SHA3 candidates)
2. All finalists hash functions in https://github.com/bsdphk/PHC (pas…
-
I was wondering if lazy reductions are possible to speed up the EC operations.
This is as far as I can tell relevant for affine, Jacobian and projective formulas, where intermediate terms are comp…
-
After reading the article and the code, I have some questions about the key generation. Do I need to generate the g1, g2, gt for my model? or I can use the same generator as you used in your code?
…
-
After using the site for a couple years with the same family group of 10+ people (perhaps minor deviations in pairing exclusions), too many of us got the exact same pairing as last year. Either this w…
-
KeePassHttp uses AES in CBC mode, which is malleable. The nonce based authentication doesn't prevent this either (if it is supposed to be a MAC, it is badly broken). Using AES in GCM mode prevents the…
-
After a few iterations on both cryptographic primitives and language designs, biscuit is in a phase of iterative improvements.
Biscuit is used in production in several places, the rust implementati…
-
MetaMask uses BIP32 HD keys, which means a single root seed phrase can result in many wallets. Unfortunately, it calls `deriveChild(i)` where `i` is a small number which means the additional keys it …