There was considerable attention around Passkeys last year. It was sometimes presented as the password killer technology. This came from the announcements of Apple and
Author: Sylvain Pelissier
LUKS disk encryption with FIDO2
FIDO2 security keys offer a versatile range of user authentication options. We have explored some of these possibilities during a workshop we presented at ph0wn.
Getting apples, bananas or cherries from hash functions !
This article is a follow-up of the excellent blog post written last year by Pascal Junod. This explains the strange title. The former post was
Lattice-free half-half attack on Bitcoin and Ethereum
Public blockchains have a long history of attacks regarding their ECDSA signatures. Since all transactions are publicly available, it makes a perfect experimental field for
Audit of drand Timelock Encryption
The Drand team at Protocol Labs recently released a timelock encryption based on the Drand threshold network run by the League of entropy. This timelock encryption construction ensures a ciphertext will be decryptable only after some specified time has
passed and not before. The cryptographic construction of the timelock encryption was recently presented in depth during the Real World Cryptography conference.
Dissecting and Detecting Babuk ransomware Cryptography
Written by Sylvain Pelissier and Antonio De La Piedra of the Kudelski Security Research Team The Babuk or Babyk ransomware was detected two years ago.