rdv live from Tokyo

See our online course on quantum computing or our online courses on quantum communication.

Monday, January 27, 2020

New Factoring Record

›
After a quiet interval of just two weeks shy of a decade, on December 2nd the team of F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Th...
Sunday, January 26, 2020

Bill Manning

›
This morning I talked to Julie Manning, Bill's wife. Bill died early Saturday morning, at home in Oregon.  Most of you know Bill was...
6 comments:
Tuesday, January 14, 2020

Quantum Conference Calendars

›
For reference, here is a calendar for upcoming quantum workshops and conferences that seem to be kept up to date: Quantum Technology Lab ...
3 comments:
Monday, January 13, 2020

2.4 Linear Cryptanalysis

›
Linear cryptanalysis (LC) is a known plaintext attack, developed by  Mitsuru Matsui in 1990 after being inspired by differential cryptanaly...

2.3 Differential Cryptanalysis

›
(I'm back, after a bit of a break. If you missed it, you can go back to the beginning of  What Every Quantum Researcher and Engineer Sho...
Friday, January 10, 2020

Favorite Books of the Last Decade

›
It seems the height of hubris to declare the "best books of the decade", when I read perhaps three hundred in that time span, whi...
Friday, December 20, 2019

Network Graph Visualization Software

›
Just a short list of network/graph visualization software we have used for various things. I keep losing track of them, so I figured it was ...
Saturday, November 30, 2019

2.2 Birthday Paradox, or, When Should I Change my Encryption Keys?

›
You're probably familiar with the basic idea of the birthday paradox : If you have $n$ people in a room, what's the probability of t...

Quantum Information Theory, Computing, Algorithms, Networking, Engineering and Education Journals

›
(Edited on 20/2/29 and 20/5/19, as noted in line.) The field of quantum computing, broadly constituted, is changing rapidly. Hundreds, ...
Friday, November 29, 2019

2.1.2 Diffusion and Confusion

›
Claude Shannon, in his seminal article on the mathematics of cryptography , defined two concepts he called diffusion  and confusion .  In di...
Thursday, November 07, 2019

2.1 Playing Defense / 2.1.1 Entropy

›
2.1.1 Entropy The single most important concept in cryptography -- indeed, in all of information theory, and inarguably one of the most im...
Wednesday, October 30, 2019

2. Cryptanalysis

›
The general idea of trying to decode messages that are encrypted is known as cryptanalysis . Some of the planet's smartest people have...

1.4 Notes & References

›
Coming soon to a blog near you!

1.3.3 Limitations of Block Ciphers

›
One obvious problem with the most straightforward application of a block cipher is that it's deterministic.  If you just apply the trans...

1.3.2 AES (the Advanced Encryption Standard)

›
AES, the Advanced Encryption Standard, has replaced DES.  It is a type of block cipher known as a substitution-permutation cipher .  AES use...
Thursday, October 24, 2019

Google's Quantum Supremacy Paper

›
[Important update, 10/25 0630. Dave Bacon has corrected me.  The chip is  fully programmable. I had thought that the choice of coupler patte...
Thursday, October 17, 2019

1.3.1 DES (the Data Encryption Standard)

›
DES, the Data Encryption Standard, was designed by IBM in the 1970s, consulting with the NSA.  DES is a type of cipher known as an iterative...
Monday, October 14, 2019

1.3 Bulk Data Encryption

›
D-H and RSA are pretty easy to understand, and known to be vulnerable to quantum computers, hence attract a lot of attention. The workhorse ...
Friday, October 11, 2019

1.2 Key Generation

›
See the previous section here . The other algorithm we talk about a lot as being both important and vulnerable to Shor's factoring alg...
Thursday, October 10, 2019

1.1 Authentication

›
Previous post in this series is here . Okay, time to dive into this in more technical depth. Let's go phase by phase: 1.1 Authentica...
‹
›
Home
View web version

About Me

My photo
rdv
View my complete profile
Powered by Blogger.