Extract only needed citations from large bibfiles
I like to use cryptobib, because it gives me consistent results and it contains almost everything relevant to me. However, as crypto.bib is over 725000 lines long, parsing it to …
I like to use cryptobib, because it gives me consistent results and it contains almost everything relevant to me. However, as crypto.bib is over 725000 lines long, parsing it to …
In the RFC for TLS 1.3 (RFC8446) especially, the key exchange is defined in terms of (EC)DH key shares being exchanged. This limits us to algorithms which support non-interactive …
The new TLS 1.3 standard \[1\] does not yet provide any support for post-quantum algorithms. In this blog post we’ll be talking about how we could negotiate a post-quantum key …
I’m going to Cuba as my submission to Latincrypt 2017 was accepted! The paper is called Energy-efficient ARM64 Cluster with Cryptanalytic Applications: 80 cores that do not cost …
You can set up SSH to prefer Elliptic Curve cryptography over RSA, and use modern key exchange algorithms without exposing yourself to Logjam-style attacks. It’s also good to get …
In July, Peter Schwabe, who supervised my Bachelor’s thesis project, suggested to submit my work to the Student Research Conference. It then turned out that the deadline was the …
Tegenlicht today had an episode about Bitcoin where they announced they were going to give away €100 in Bitcoin. They were going to put up a Bitcoin wallet private key as a QR-code …
I’ve had to rename some fields today with MongoEngine. Using the following approach, I was able to raise DeprecationWarnings when old version were used. Create the following …
Today I’ve tried to globally install Powerline. That was a bit of a pain because it has no global config files. Quick and dirty how-to: Add XDG_CONFIG_DIRS=/etc/xdg to …