The history of this blog might very well be a cautionary tail (sic) about scope creep. AJ The Original Vision For Dhole Moments Originally, I just wanted a place to write about things too long for …| Dhole Moments
HKDF has poorly-understood subtleties. Let’s explore them in detail.| Dhole Moments
Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Enc…| Dhole Moments
Update (2024-06-06): There is an update on this project. As Twitter’s new management continues to nosedive the platform directly into the ground, many people are migrating to what seem like d…| Dhole Moments
A lot of recent (and upcoming) blog posts I’ve written, and Fediverse discussions I’ve participated in, have been about the security of communication products. My criticism of these pro…| Dhole Moments
Head’s up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly a…| Semantically Secure
An introduction to database cryptography.| Dhole Moments