
Aug 3, 2022 • 39M
A Tower of Cryptographic Abstractions
Press F for SIDH, and then... Problems, Primitives, Schemes, Protocols, and Applications oh my!
Musings about cryptography, software, and technology
Topics in this episode:
The recent breakage of SIDH
A taxonomy of different cryptographic constructions
What constructions are better suited for standards? What about software?
Why is it hard to provide protocols as a library?
Why threat modelling and security properties will always be important
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.