Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
More Maths, Please
More Maths, Please
To me, the countries that will be successful in the future are the ones who will best produce scientists, engineers and mathematicians…
Prof Bill Buchanan OBE FRSE
Sep 14
Proving Alice is Alice With A Pseudo Random Function (PRF)
Proving Alice is Alice With A Pseudo Random Function (PRF)
Let’s say that Bob wants Alice to prove she knows a secret value. For this, we could use a PRNG (Pseudo-random number generator), and which…
Prof Bill Buchanan OBE FRSE
Sep 12
Finally, A Security Framework for Devices: EMB3D
Finally, A Security Framework for Devices: EMB3D
It seems like a dream, but what if we could design systems which were “secure by design”, and not have to fix problems later on. And, the…
Prof Bill Buchanan OBE FRSE
Sep 11
A True Random Number Generator: Jitter Fluctions
A True Random Number Generator: Jitter Fluctions
The core of your security is typically explicitly linked to one thing … pseudo-random number generation. While we can integrate with a…
Prof Bill Buchanan OBE FRSE
Sep 9
The Brainpool Curves
The Brainpool Curves
The P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…
Prof Bill Buchanan OBE FRSE
Sep 8
The Wonderful Ring Learning With Errors (RLWE) and Homomorphic Encryption
The Wonderful Ring Learning With Errors (RLWE) and Homomorphic Encryption
We live in a computing world which has really changed much from the computing model defined by Von Numan. Basically all our data bits can…
Prof Bill Buchanan OBE FRSE
Sep 7
EUCLEAK and Side Channels
EUCLEAK and Side Channels
And it’s not just YubiKeys
Prof Bill Buchanan OBE FRSE
Sep 4
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams