Topics in this episode:
The recent breakage of SIDH
A taxonomy of different cryptographic constructions
What constructions are better suited for standards? What about software?
Why is it hard to provide protocols as a library?
Why threat modelling and security properties will always be important
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.