Introduction to the Diffie-Hellman key exchange| www.gabriel.urdhr.fr
Stunned by losing their robotic devices, [REDACTED] learnt that they were hijacked by attackers even with communication being encrypted. Having researched its firmware and found numerous cryptographic failures, we've crafted a few demos on how cryptography goes wrong in real life.| Cossack Labs
How to build secure crypto wallets, analysing issues found during crypto wallet security audits.| Cossack Labs
When it comes to designing secure protocols, I have a principle that goes like this: if you have to perform any cryptographic operation before verifying the MAC on a message you’ve received, it will somehow inevitably lead to doom.| Moxie Marlinspike