Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
The Brainpool Curves
The Brainpool Curves
The P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…
Prof Bill Buchanan OBE FRSE
Sep 8
The Wonderful Ring Learning With Errors (RLWE) and Homomorphic Encryption
The Wonderful Ring Learning With Errors (RLWE) and Homomorphic Encryption
We live in a computing world which has really changed much from the computing model defined by Von Numan. Basically all our data bits can…
Prof Bill Buchanan OBE FRSE
Sep 7
EUCLEAK and Side Channels
EUCLEAK and Side Channels
And it’s not just YubiKeys
Prof Bill Buchanan OBE FRSE
Sep 4
Squeezing Bits: Meet MD, Sponge and HAIFA
Squeezing Bits: Meet MD, Sponge and HAIFA
At a conference in 1989, something magical happened that changed cybersecurity. Ralph Merkle presented a paper on digital signatures [1]:
Prof Bill Buchanan OBE FRSE
Sep 3
My Top 5 Programming Languages
My Top 5 Programming Languages
I use GitHub a great deal and I have some open source developments, but I mainly use it for private version control of documents and source…
Prof Bill Buchanan OBE FRSE
Sep 1
Rockets, Electric Cars and When Open Source Goes For Profit
Rockets, Electric Cars and When Open Source Goes For Profit
Ellon Musk has taken so many risks in his life, and — inspired by Hitchhickers Guide to the Galley — asked the question of why we can’t…
Prof Bill Buchanan OBE FRSE
Aug 31
Teaching Theory and Practice in Cryptography: The Wonderful Jupyter Notebooks
Teaching Theory and Practice in Cryptography: The Wonderful Jupyter Notebooks
You should never stick to what you know, and should always push yourself in innovate and change something about your work. In this way you…
Prof Bill Buchanan OBE FRSE
Aug 31
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams