
FiatShamir Heuristic
20180922
Overview and implementation of the FiatShamir heuristic used to build signature schemes from interactive zeroknowledge proofs.

Building Lattice Reduction (LLL) Intuition
20170725
My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.

Subgroup Confinement Attacks
20170114
Subgroup confinement attacks can apply in offline and online contexts.

Userinfluenced Shell Commands Are Still Considered Harmful
20161206
Nonobvious ways of getting code execution when testing code that uses user input to build shell commands.

The GGH Cryptosystem
20161123
An introduction to latticebased cryptography using the broken Goldreich–Goldwasser–Halevi (GGH) cryptosystem.

ASIS CTF 2016: RSA Writeup
20160918
Breaking RSA with sequential prime key parameter generation.

Tokyo Westerns / MMA CTF: Twin Primes Writeup
20160901
Decrypting RSA ciphertexts using correlated parameters.

Modifying IP Headers With netfilter
20160820
Using netfilter to programmtically rewrite the source IP address of ICMP packets.

Authorization Design Patterns
20160801
Patterns/antipatterns for designing authorization APIs.

Iceland
20160801
Takeaways from my first trip to Iceland and places I hope to revisit.