Below is a list of links that I found interesting:
-
2025/03/27:
Understanding and Explaining Post-Quantum Crypto with Cartoons
by Klaus Schmeh
I love the explanation by cartoons. It introduces PQC in a super nice way! -
2025/03/02:
Hashing Apples, Bananas and Cherries
by Pascal Junod
In theoretical cryptography, the message to be hashed (for signing in a signature) is always referred to as a sequence of bytes. But in practice, what information should we include in the message? How to structure the information? This is also important in security, but left as the responsibility of the engineers. -
2025/02/15:
15 Tips And Tricks On Learning Really Hard Things
by David Wong
I know David Wong from his book, Real-World Cryptography, and his blog His explanations are always clear and easy to understand. From this video, I learned that well-known experts sometimes have difficulty understanding things, but they find ways to overcome it. -
2025/01/10:
AES: How to Design Secure Encryption
by Spanning Tree
We know how AES work, but we don't know what makes it a secure algorithm. Why are there Key Schedule, SubBytes, ShiftRows, MixColumns, AddRoundKey? This video explain the AES from a designers' perspective. -
2024/11/28:
Big Endian vs. Little Endian: Key Comparisons
by Hossein Ashtari
This is a simple explanation of big endian and little endian. -
2024/11/01:
Tutorial of Template Attack
by NewAE Technology
This tutorial provides a step-by-step template attack on AES. -
2024/10/13:
How do QR codes work?
by Veritasium
This video presents the history and the techniques behind QR codes. -
2024/10/13:
Test-of-Time Award for paper: Correlation Power Analysis with a Leakage Model
by Francis Oliver
This presentation is very informative: the stories behind the paper, many new research directions after the paper, what's going on this industry, what's next... -
2024/10/12:
End-to-End Encrypted Cloud Storage in the Wild
by Jonas Hofmann and Kien Tuong Truong
This paper presents different interesting attacks on 5 encrypted cloud storage providers. -
2024/09/12:
Better-performing “25519” elliptic-curve cryptography
by Torben Hansen and John Harrison
This blog explains how they accelerate x25519 and Ed25519 in x86_64 and Arm64 micro-architectures. -
2024/09/10:
Pairings for the Rest of Us
by Boyan Barakov
This is a gentle introduction about parings for beginners. I love the author's shares about his learning journey. -
2024/09/03:
EUCLEAK: Side-Channel Attack on the YubiKey 5 Series
by Thomas Roche
This interesting attack shows why constant-time implementation is important in crypto. -
2024/08/26:
Is Telegram really an encrypted messaging app?
by Matthew Green
This is an excellent blog about the encryption feature in Telegram. I quote my favorite paragraph: "My strong suspicion is that many people who join Telegram for its social media features also end up using it to communicate privately. And I think Telegram knows this, and tends to advertise itself as a “secure messenger” and talk about the platform's encryption features precisely because they know it makes people feel more comfortable." -
2024/08/26:
Template Attacks
by NewAE Technology
This a gentle introduction about template attacks. It provides detailed steps of the attack concept and explains the intuition behind. -
2024/08/25:
Soft Analytical Side-Channel Attacks on the Number Theoretic Transform for Post-Quantum Cryptography
by Frank Custers
This is a master thesis. I enjoyed the step-by-step explanation with a toy example about SASCA. -
2024/08/22:
Side-Channel Leakage of Masked CMOS Gates
by Stefan Mangard, ThomasPopp and Berndt M. Gammel
This paper explained what glitches are and how they affect the DPA security. This is a fundamental paper leading to the invention of modern masking schemes such as Threshold Implementation. The explanations are very easy to understand. -
2024/08/01:
Computational Aspects of Correlation Power Analysis
by Paul Bottinelli and Joppe W. Bos
This paper presented many approaches of computing Pearson correlation in side-channel analysis. The authors started from a naïve computation algorithm, then pointed out the limitation in terms of time and/or memory, especially when a large number of traces is used for the computation. From that, they proposed many improved versions for the computation algorithm and thoroughly compared their efficiency. -
2024/07/01:
Computing the Signal-to-Noise Ratio (SNR) for SCA
by Ileana Buhan
This is an easy-to-understand introduction about the concept of SNR. The author started by explaining SNR from a statistical point of view, then linked it to the context of side-channel analysis (SCA).