RT @hrdng: If you generated a wallet using Libbitcoin's Bitcoin Explorer, including as described in the appendix to Mastering Bitcoin, your funds are at risk (or already stolen). Full details: https://t.co/Crlw63lUr4
RT @yx7__: ✓ https://t.co/Q3mYiQWUlW
RT @luca_defeo: One last update to https://t.co/OFu4MXojBl "SIDH Proof of Knowledge" 😢 (with @meshcollider, @EllipticKiwi, Lukas Zobernig) But proofs of isogeny knowledge are not dead yet 💪. See you at #Asiacrypt! https://t.co/KZOix0YZYv
RT @EllipticKiwi: Starting next week: VaNTAGe seminar series on isogeny-based cryptosystems https://t.co/jw7abQzf7D
RT @yx7__: You could have broken SIDH. https://t.co/EZKUnNXOHW
RT @Leptan: Next version of Bouncy Castle will also include CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon, and other algorithms! It is available as beta right now at https://t.co/eCO9dydNrV 🎉. A great way to experiment (with care!) with the schemes being standardized by NIST. https://t.co/duiGW9HSU6
RT @FouotsaB: In this preprint, in order to counter the Castryck-Decru attack (and derivatives), we suggest to use a fixed degree, but then mask only the torsion point information. How do we do that and why is this worth exploring? A thread! 1/n
RT @d_feldman: In which a blogger finds the private key used to sign Hyundai car software updates … by googling it. They used a key pair from a popular tutorial. 😂😂😂 https://t.co/ydoWfjbvsR
RT @GondoPloum: I just posted an updated and clarified version of my previous paper (which was too hastily written...) on breaking SIDH: https://t.co/iAbgxjN5Kf
RT @isogenies: It works!! Here's a @sagemath implementation of the SIDH Key Recovery attack of Castryck and Decru. Huge thanks to @oudomphe. Their insights allowed us to directly compute the image of points in the Jacobian through divisors. No Gröbner needed! https://t.co/yzBrTGP4sr
RT @IACR_News: #ePrint An efficient key recovery attack on SIDH (preliminary version): W Castryck, T Decru https://t.co/2DAWdVYuNA
RT @EllipticKiwi: Congratulations to @meshcollider , who successfully defended his PhD thesis "Key Exchange and Zero-Knowledge Proofs from Isogenies and Hyperelliptic Curves" this morning.
RT @EllipticKiwi: On Thursday I am giving an online seminar on isogeny proofs of knowledge https://t.co/18Vm6wawOD
RT @ChristopherA: This paper got less attention than I thought it would. Among its claims is that BIP32 (used extensively by Bitcoin but also many other blockchains) offers 91 bits of security. I always assumed some low n?<128, but not so low. Given BIP32 is a decade old it was overdue for review.
RT @bcrypt: when reading text in a non-native language & wondering how it's pronounced, u can enter this in devtools to have the browser pronounce it: u=new SpeechSynthesisUtterance(getSelection().toString());u.lang='ru-RU';speechSynthesis.speak(u) (replace 'ru-RU' with any BCP 47 tag)
RT @chris_belcher_: An alpha version of my coinswap project is released! https://t.co/WeA209GhzP Doesnt have all the features yet, but works on regtest, signet and mainnet Imagine a new privacy tech for bitcoin, like coinjoin, but cant be blocked b/c the txes look exactly the same as regular txes
PhD Thesis submitted✅🎉 Has been a great journey, thank you @EllipticKiwi for your excellent supervision! Now the wait for the examiners' reports begins 😎 https://t.co/p1xsHqFf4B
RT @hillelogram: Why are you idiots using TOOLS? JUST👏BE👏BETTER👏CODERS👏