Robuta

https://dmcc.ae/latest-news/dmcc-launches-crypto-centre-champion-cryptographic-and-blockchain-technologies-dubai
DMCC has announced the launch of the DMCC Crypto Centre, a comprehensive ecosystem for businesses operating in the cryptographic and blockchain sectors.
launchescryptocentrechampionblockchain
https://diligence.security/audits/2020/03/thesis-cryptographic-review/
Overview This document is the result of a design and code review of the cryptographic constructions and algorithms used in the keep network. This cryptographic...
thesiscryptographicreviewconsensysdiligence
https://www.idemia.com/quantum-ready-cryptographic-libraries
Oct 23, 2025 - IDEMIA Sphere Cryptographic Library offers certified algorithms for secure, high-performance encryption and digital signature, supporting both classical...
quantumreadycryptographiclibrariesidemia
https://codasip.com/2025/03/26/design-and-implementation-of-a-hardened-cryptographic-coprocessor/
Mar 31, 2025 - The proposed RV128 coprocessor offloads cryptographic workloads from the main CPU thus enhancing system efficiency.
designingcryptographicriscvbit
https://josa.ngo/blog/271
Discover what makes a Cryptographic Random Number Generator (CRNG) truly BASED: unpredictable, statistically random, and resilient against attacks.
random number generatormakesgoodcryptographic
https://blog.cryptographyengineering.com/2014/12/29/on-new-snowden-documents/
If you don’t follow NSA news obsessively, you might have missed yesterday’s massive Snowden document dump from Der Spiegel. The documents provide a...
newsnowdendocumentsthoughts
https://www.devicesecurity.io/whitepapers/iot-device-security-cryptographic-keys-w-9994?rf=RAM_AlsoBeInterestedIn
Cryptographic keys and identities are required to protect data, authenticate devices to the network and each other. These keys are at the heart of any IoT...
device securityiotcryptographickeys
https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/
I learn about cryptographic vulnerabilities all the time, and they generally fill me with some combination of jealousy (“oh, why didn’t I think of...
thoughtscryptographicengineering
https://blog.cryptographyengineering.com/about-me/
I’m a cryptographer and professor at Johns Hopkins University. I’ve designed and analyzed cryptographic systems used in wireless networks,...
thoughtscryptographicengineering
https://elie.net/publication/generalized-power-attacks-against-crypto-hardware-using-long-range-deep-learning
We present GPAM the first side-channel attack model that generalizes across multiple cryptographic algorithms, implementations, and side-channel...
powerattackscryptohardwareusing
https://blog.cryptographyengineering.com/2013/12/03/how-does-nsa-break-ssl/
A few weeks ago I wrote a long post about the NSA’s ‘BULLRUN’ project to subvert modern encryption standards. I had intended to come back to...
nsabreaksslthoughts
https://blog.cryptographyengineering.com/2013/09/06/on-nsa/
Let me tell you the story of my tiny brush with the biggest crypto story of the year. A few weeks ago I received a call from a reporter at ProPublica, asking...
nsathoughtscryptographicengineering
https://github.com/did-method-plc/did-method-plc
Public Ledger of Credentials: a cryptographic, strongly-consistent, and recoverable DID method - did-method-plc/did-method-plc
githubmethodplcpublicledger
https://sits.com/en/cryptographic-solutions/
Nov 22, 2025 - Secure your IT infrastructure with modern Cryptographic Solutions – for data protection, integrity and protection against cyber threats.
cryptographicsolutionssits
https://openjdk.org/jeps/470
jeppemencodingscryptographicobjects
https://www.ghsiss.com/advanced-security/
Aug 2, 2022 - The ISS Embedded Cryptographic Toolkit™ (ECT) is a standards-based, FIPS 140-2 compliant, platform agnostic cryptographic library used by embedded developers...
security servicesintegrityembeddedcryptographicmodule
https://blog.cryptographyengineering.com/2018/01/16/icloud-in-china/
Last week Apple made an announcement describing changes to the iCloud service for users residing in mainland China. Beginning on February 28th, all users who...
applechinaholdskeys
https://blog.cryptographyengineering.com/2015/02/19/how-to-paint-yourself-into-corner/
The information security news today is all about Lenovo’s default installation of a piece of adware called “Superfish” on a number of laptops shipped...
paintcornerlenovoedition
https://blog.cryptographyengineering.com/2025/02/12/u-k-asks-to-backdoor-icloud-backup-encryption/
I’m supposed to be finishing a wonky series on proof systems (here and here) and I promise I will do that this week. In the midst of this I’ve been...
ukencryption
https://blog.cryptographyengineering.com/2023/10/06/to-schnorr-and-beyond-part-1/
Warning: extremely wonky cryptography post. Also, possibly stupid and bound for nowhere. One of the hardest problems in applied cryptography (and perhaps all...
beyondpartthoughts
https://blog.cryptographyengineering.com/2015/04/02/truecrypt-report/
A few weeks back I wrote an update on the Truecrypt audit promising that we’d have some concrete results to show you soon. Thanks to some hard work by...
reportthoughtscryptographicengineering
https://blog.cryptographyengineering.com/2012/02/21/random-number-generation-illustrated/
Last week we learned (from two different sources!) that certain RSA implementations don’t properly seed their random number generators before generating...
random number generationillustratedprimerthoughts
https://u.today/peter-todd-reacts-to-adam-backs-new-proposal-to-convert-bitcoin-into-cryptographic-accumulator
Peter Todd has shared his take on major new Bitcoin-related idea suggested by Blockstream CEO.
adam backpetertoddreactsnew
https://blog.cryptographyengineering.com/2025/02/19/how-to-prove-false-statements-part-3/
This is the third and penultimate post in a series about theoretical weaknesses in Fiat-Shamir as applied to proof systems. The first post is here, the second...
provefalsestatementspart
https://www.ghsiss.com/cryptographic-toolkits/
Aug 9, 2022 - The ISS Embedded Cryptographic Toolkit™ (ECT) is a standards-based, FIPS 140-2 compliant, platform agnostic cryptographic library used by embedded developers...
security servicesintegritycryptographictoolkits
https://verifpal.com/
Verifpal is free and open source software for the analysis and verification of cryptographic protocols. It uses a new, simple language for modeling protocols,...
cryptographicprotocolanalysisstudentsengineers
https://blog.cryptographyengineering.com/2017/01/21/zero-knowledge-proofs-an-illustrated-primer-part-2/
This post is the second in a two-part series on zero-knowledge proofs. Click here to read Part 1. In this post I’m going to continue the short,...
zero knowledge proofsillustratedprimerpart
https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password...
lettalkpakethoughts
https://blog.cryptographyengineering.com/2015/08/16/the-network-is-hostile/
Yesterday the New York Times and ProPublica posted a lengthy investigation based on leaked NSA documents, outlining the extensive surveillance collaboration...
networkhostilethoughtscryptographic
https://www.virtru.com/newsroom/virtru-announces-first-ever-fips-140-2-validated-javascript-cryptographic-module
Virtru today announced it achieved FIPS 140-2 validation for its JavaScript cryptographic library, the first to be certified by NIST.
first evervirtruannouncesfipsvalidated
https://www.cablelabs.com/blog/addressing-emerging-cryptographic-threats-quantum-computing
Oct 13, 2025 - We review the threats against cryptography on the horizon, the solution to mitigate those threats and actions for network operators to start migration to new...
quantum computingaddressingemergingcryptographicthreats
https://link.springer.com/journal/13389?error=cookies_not_supported&code=ba70fd65-a370-4f57-8d7f-ad768dccf16b
Journal of Cryptographic Engineering is dedicated to presenting high-quality scientific research on architectures, algorithms, techniques, tools, ...
journalcryptographicengineering
https://www.bouncycastle.org/about/
Apr 11, 2024 - Bouncy Castle is the most widely used FIPS-certified cryptographic API for Java, C#, Kotlin and more.
bouncy castleopen sourcefipscertifiedcryptographic
https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/
Trigger warning: incredibly wonky theoretical cryptography post (written by a non-theorist)! Also, this will be in two parts. I plan to be back with some more...
provefalsestatementspart
https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/
Today’s Washington Post has a story entitled “Johns Hopkins researchers poke a hole in Apple’s encryption”, which describes the results of...
attackweekappleimessagethoughts
https://keybase.io/blog/crypto
Official blog of Keybase
newcryptographictoolskeybase
https://blog.cryptographyengineering.com/2013/12/28/a-few-more-notes-on-nsa-random-number/
Last Friday, Joseph Menn from Reuters published an article claiming that RSA, the pioneering security firm and division of EMC, accepted $10 million dollars...
random numbernotesnsagenerators
https://blog.cryptographyengineering.com/2025/02/06/how-to-prove-false-statements-part-2/
This is the second part of a two three four-part series, which covers some recent results on “verifiable computation” and possible pitfalls that...
provefalsestatementspart
https://blog.cryptographyengineering.com/2015/12/22/on-juniper-backdoor/
You might have heard that a few days ago, Juniper Systems announced the discovery of “unauthorized code” in the ScreenOS software that underlies...
juniperbackdoorthoughtscryptographic
https://blog.cryptographyengineering.com/2011/12/15/whats-deal-with-rc4/
Jacob Appelbaum tweets: Does anyone have a good reading list on practically attacking RC4? I don’t intend to give an exact answer to Jacob’s...
deal
https://link.springer.com/book/10.1007/978-3-662-44709-3?error=cookies_not_supported&code=7069a418-5a15-4cdf-9ee3-2a2ee96a6fd1
embedded systemscryptographichardwareinternationalworkshop
https://www.keyfactor.com/blog/agilesec-and-servicenow-enable-enterprise-quantum-readiness-with-cryptographic-posture-management/
Oct 30, 2025 - Keyfactor's new integration with ServiceNow enables cryptographic vulnerability remediation and quantum-readiness.
servicenowenableenterprisequantumreadiness
https://blog.cryptographyengineering.com/2014/08/13/whats-matter-with-pgp/
Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google’s end-to-end email extension. This is a Big Deal. With...
matterpgp
https://www.keyfactor.com/resources/topic/col/quantum-readiness/cryptographic-inventory-whitepaper-hsbc?pflpid=61818&pfsid=HAhyRZraRV
cryptographicinventoryvaluetodaypreparing
https://link.springer.com/book/10.1007/978-3-319-01628-3?error=cookies_not_supported&code=006a5e7b-b1fe-47dd-8c14-3df820a71d18
brief historyspringer naturecryptographicalgorithms
https://www.bouncycastle.org/download/
May 15, 2024 - Download Bouncy Castle cryptographic APIs for Java or C#, in Kotlin, or as FIPS-certified or Long Term Stable (LTS) releases.
bouncy castledownloadcryptographicapis
https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/
This blog is mainly reserved for cryptography, and I try to avoid filling it with random “someone is wrong on the Internet” posts. After all,...
donechrome
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
A few months ago it was starting to seem like you couldn’t go a week without a new attack on TLS. In that context, this summer has been a blessed...
attackweekbittls
https://blog.cryptographyengineering.com/2013/09/18/the-many-flaws-of-dualecdrbg/
The Dual_EC_DRBG generator from NIST SP800-90A. Update 9/19: RSA warns developers not to use the default Dual_EC_DRBG generator in BSAFE. Oh lord. As a...
manyflawsdualec
https://blog.cryptographyengineering.com/2014/11/27/zero-knowledge-proofs-illustrated-primer/
One of the best things about modern cryptography is the beautiful terminology. You could start any number of punk bands (or Tumblrs) named after cryptography...
zero knowledge proofsillustratedprimerthoughts
https://www.evolutionq.com/
evolutionQ provides future-proof cryptographic resilience for companies in critical industries.
cybersecurity solutionscryptographicresilience
https://www.keylength.com/
Easily find the minimum cryptographic key length recommended by different scientific reports and governments.
cryptographickeylengthrecommendation