Prof Bill Buchanan OBE FRSEAfter 48 Years, It’s A Long Goodbye to the Diffie-Hellman MethodThis week, in my lecture, I will outline one of the most amazing methods ever created in computer science: the Diffie-Hellman method. It…2d ago2d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Brainpool CurvesThe P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…Sep 81Sep 81
Prof Bill Buchanan OBE FRSEMilitary Grade Cryptography Cracked? No!There’s a big difference between someone hacking something, and someone cracking something6d ago36d ago3
Prof Bill Buchanan OBE FRSEThe End of Role-based Security and the Rise of Attribute-based SecurityThe Internet is over five decades old, and still, we have data breaches and cybersecurity compromises. One of the problems in this relates…Aug 239Aug 239
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA Long Goodbye to RSA, ECDSA and EdDSA, and Big Hello to ML-DSAJust this week, Cloudflare released the ML-DSA methods within their CIRCL library, and which supports the Dilitium digital signature method…3d ago3d ago
3rd Street CapitalNillion and the Future of Secure Computation in Machine LearningA new era of machine learning6h ago6h ago
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 134Jun 134
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceTowards The Future of the Trust, Privacy and Security: Kurt Rohloff and Yuriy PolyakovThey say you should never meet your heroes, but I have met mine, and they were so humble, knowledgeable and open about their contributions…Oct 11Oct 11
Tech Insights HubDay 30: Advanced Multithreading and Concurrency in RustBlog Link, If you are not a member: Click Here17h ago17h ago