PinnedHow NOT to implement RSAI have recently started working on https://www.hackthebox.com/ and https://cryptopals.com/ again and here is a short write-up to one of the…Nov 9, 2022Nov 9, 2022
Recovering AES key from side-channel analysisToday I have a write-up for one of the crypto challenges from the Google 2022 CTF (https://capturetheflag.withgoogle.com/) called Electric…Nov 22, 2022Nov 22, 2022
How does a (t, n)-threshold scheme work in practice?I was recently watching a video on youtube on formal methods of verification and I started thinking of how and where I could apply it.Aug 22, 2022Aug 22, 2022
The modern way of approaching the public key infrastructureWhat is public key infrastructure?Jun 2, 2022Jun 2, 2022
The benefits of HSM (Hardware Security Module) and other detailsIn my previous article,May 30, 2022May 30, 2022
The importance of HSM (Hardware Security Module): Before and after PQC.What is HSM?May 25, 2022May 25, 2022