Posts

Extract only needed citations from large bibfiles

I like to use cryptobib, because it gives me consistent results and it contains almost everything relevant to me. However, as …

Rephrasing TLS key exchange in terms of KEMs

In the RFC for TLS 1.3 (RFC8446) especially, the key exchange is defined in terms of (EC)DH key shares being exchanged. This limits us …

Using (post-quantum) KEMs in TLS 1.3

The new TLS 1.3 standard [1] does not yet provide any support for post-quantum algorithms. In this blog post we’ll be talking …

Latincrypt paper!

Securing OpenSSH

You can set up SSH to prefer Elliptic Curve cryptography over RSA, and use modern key exchange algorithms without exposing yourself to …

Prøst at Student Research Conference

In July, Peter Schwabe, who supervised my Bachelor’s thesis project, suggested to submit my work to the Student Research …

Bitcoin private key qrcode scraper

Tegenlicht today had an episode about Bitcoin where they announced they were going to give away €100 in Bitcoin. They were going to put …

Deprecating fields in MongoEngine Documents

I’ve had to rename some fields today with MongoEngine. Using the following approach, I was able to raise DeprecationWarnings when …

Prøst