Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Love P256, but also want Kyber?
Love P256, but also want Kyber?
P256 rules in key exchange, and is, by far, the most popular method used with ECDH (Elliptic Curve Diffie Hellman). But, elliptic curve…
Prof Bill Buchanan OBE FRSE
Jun 1
Happy 50th Birthday to SQL
Happy 50th Birthday to SQL
For decades, it was IBM who were at the forefront of computing, and who conducted world-leading research. And, so, in 1957, they created…
Prof Bill Buchanan OBE FRSE
May 31
Roger Needham
Roger Needham
Recently, we lost a great leader in cryptography: Ross Anderson [here]. Ross had the privilege to have Roger Needham as his PhD supervisor…
Prof Bill Buchanan OBE FRSE
May 30
The Galois field (GF)
The Galois field (GF)
On this day (30 May) in 1832, Évariste Galois — pronounced Gal-wha — died of duelling wounds at the age of 20 but left a great legacy…
Prof Bill Buchanan OBE FRSE
May 30
Writing Your Name in the Sand: A Magic Trick With Random Numbers
Writing Your Name in the Sand: A Magic Trick With Random Numbers
In random number generation, we need to make sure that every single random value produced is equally probable. If not, we can gain an…
Prof Bill Buchanan OBE FRSE
May 29
The GPTbot
The GPTbot
My server — https://asecuritysite.com — started to run very slowly, and so I investigated the cause. And, guess what? It was being bought…
Prof Bill Buchanan OBE FRSE
May 29
Love Your Work and the Place You Work
Love Your Work and the Place You Work
It is a great thing to be proud of who you work for and where you are based. In the past few decades, I have seen my university and school…
Prof Bill Buchanan OBE FRSE
May 28
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams