A question for you

This post is addressed to you, my patient and wonderful audience.

I realize that my interests may not be entirely representative of yours. So what would you like to read about? I don’t guarantee that I’ll write on any of your suggestions, but I do promise to at least think about the topics you propose.

Feel free to make your suggestions in comments or Twitter. If you don’t, be warned: you’ll be as much to blame for that future post on Leakage Resilient Cryptography as I will.

5 thoughts on “A question for you

  1. Looooots:

    – Multivariate polynomials in fields
    – ECC
    – Older crypto attacks
    – How Hash Collisions Happen
    – Explanations of FDE Modes and how they evolved
    – Practical Timing Attacks
    – Slide Attacks
    – Checklists – things you look for when reviewing things. Like replay attacks and such.
    – Any stories from the trenches – things you found that were implemented incorrectly

  2. There are lots of things I'd like to hear your thoughts about, including:

    * Are the timing attacks that seem to remain against current software AES implementations any good? How good are the defenses?
    * So, what's a poor developer to do about the ECC patent situation?
    * Predictions for 2012! Make them now while there's still time!

    But what I'd most like your thoughts about is: How should we underfunded practitioners tell a system that's had a lot of scrutiny and not been successfully attacked apart from a system that's not been successfully attacked because it hasn't had the right scrutiny?

    Happy new year!

  3. Homomorphic encryption. Also, whatever you're most passionate about. I'd rather read a blog by someone who cares about what they're writing than have it be a topic I am specifically interested in. Of course, you did already caveat your feedback request. 🙂

    Happy New Year

  4. I think that the topic which I find quite interesting (and lack of knowledge too) is Homomorphic encryption. I don't know much about it other than wikipedia etc.

    I would be fond if you could give more examples about it and even analyze some cipher which implements this concept

Comments are closed.