spar.isi.jhu.edu
Matthew D. Green
http://spar.isi.jhu.edu/~mgreen
Matthew D. Green. Department of Computer Science. I am an Assistant Professor at the Johns Hopkins Information Security Institute. My research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map-based cryptography. I was formerly a partner in Independent Security Evaluators. In Florham Park, NJ. On this subject. Additionally, I've designed several cryptographic tools, including Charm. That provides implementations of several new Attribute Based Encryp...
imperialviolet.org
ImperialViolet - All posts - ImperialViolet.org
https://www.imperialviolet.org/posts-all.html
Memcpy (and friends) with NULL pointers. The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of. Section 7.24.2.1):. Characters from the object pointed to by. Into the object pointed to by. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that. However, the standard also says (section 7.1.4):. Emphasis is mine.). I'm sure that 7.1.4 seemed quite reasonable in isolation, but how does it interact with the case where. Is called with a zero length?
reuters.com
Exclusive: NSA infiltrated RSA security more deeply than thought - study| Reuters
http://www.reuters.com/article/2014/03/31/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331
Top 100 Global Innovators. Exclusive: NSA infiltrated RSA security more deeply than thought - study. Mon Mar 31, 2014 4:27pm EDT. Exclusive: NSA infiltrated RSA security more deeply than thought - study. A sign marks the entrance to RAS's facility in Bedford, Massachusetts March 28, 2014. REUTERS/Brian Snyder. The professors found that the tool, known as the "Extended Random" extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster,...
cerezo.name
dcerezo | David Cerezo Sánchez
http://cerezo.name/blog/author/dcerezo
Best Practices on Hadoop. Middot; Leave a Comment. A quick summary from my experiences with Hadoop:. Don’t lost focus on what really matters: not to efficiently store and retrieve fabulous amount of data, but to extract useful insights from it. The quickest way to start analyzing big amounts of data is by re-using R code from CRAN. With the help of Cascading. A tool that generates PMML. Models. Mahout is a very good alternative, but not very efficient at the moment. Architecture to make a place for Hadoop.
veridicalsystems.com
Speeds and Feeds › Personal Musings of Steve Marquess
http://veridicalsystems.com/blog
Personal Musings of Steve Marquess. Life in a Digital Ghetto. Saturday, March 28, 2015. 8230;In Which I Bitch and Moan about Living on the Wrong Side of the Digital Divide in an Isolated Pocket of Digital Poverty. Fast forward nearly thirty years and the situation is quite different. Polite society assumes every respectable person has a cell phone and some sort of broadband access. My inability to reliably receive text messages at this address has been a bit of a hassle. Cable service is not available an...
blog.cryptographyengineering.com
A Few Thoughts on Cryptographic Engineering: Hopefully the last post I'll ever write on Dual EC DRBG
http://blog.cryptographyengineering.com/2015/01/hopefully-last-post-ill-ever-write-on.html
A Few Thoughts on Cryptographic Engineering. Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds. Wednesday, January 14, 2015. Hopefully the last post I'll ever write on Dual EC DRBG. I've been working on some other blog posts, including a conclusion of (or at least an installment in) this exciting series on zero knowledge proofs. That's coming soon, but first I wanted to take a minute to, well, rant. The subject of my rant is this fascinating letter. I agree with al...
catsbats.org
Cats 'n' Bats » wtf
https://catsbats.org/tag/wtf
Cats 'n' Bats. An Internet Somefin' Or Other. Sunday, December 20th, 2015. Adam's fine summary of what's known so far. Update: ISC (Infocon Yellow):. Edward's comment: " Juniper just *closed* backdoors in their product. Cisco's still wide open. FWIW, my comment: " OpenBSD. 8230; Read More. Posted in Nifty Crypto Stuff. Comments Off on Juniper Backdoors. Thursday, October 29th, 2015. A Riddle Wrapped in an Enigma. Why Is the No Such Agency Moving Away from Elliptic Curve Cryptography? Posted in Nifty Cryp...
marq3.net
Speeds and Feeds › Personal Musings of Steve Marquess
http://www.marq3.net/blog
Personal Musings of Steve Marquess. Life in a Digital Ghetto. Saturday, March 28, 2015. 8230;In Which I Bitch and Moan about Living on the Wrong Side of the Digital Divide in an Isolated Pocket of Digital Poverty. Fast forward nearly thirty years and the situation is quite different. Polite society assumes every respectable person has a cell phone and some sort of broadband access. My inability to reliably receive text messages at this address has been a bit of a hassle. Cable service is not available an...