<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.cryptographyengineering.com/some-notes-on-traffic-timing-correlations-for-cloudflares-implementation-of-privacy-pass/</loc><lastmod>2026-04-01T21:17:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2026/03/02/anonymous-credentials-an-illustrated-primer/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-18.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-10T14:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2026/02/02/whatsapp-encryption-a-lawsuit-and-a-lot-of-noise/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-13T07:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/09/c8aac9ad-a7f0-4c06-8c97-b4f077f9fad9-roasted-red-peppers-12-1.jpg</image:loc><image:title>c8aac9ad-a7f0-4c06-8c97-b4f077f9fad9--roasted-red-peppers-12</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-22T10:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/bitcoin-tipjar/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/07/newqrcodealeo.png</image:loc><image:title>newqrcodealeo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/07/qrcodealeo.png</image:loc><image:title>qrcodealeo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/04/cf3d1-qrcode.png</image:loc><image:title>cf3d1-qrcode</image:title></image:image><lastmod>2025-07-17T19:49:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2025/06/09/a-bit-more-on-twitter-xs-new-encrypted-messaging/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/xlogo.jpg</image:loc><image:title>XLogo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-17T16:06:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/some-quick-notes-on-t-oprfs/</loc><lastmod>2025-06-09T18:33:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2025/03/01/dear-apple-add-disappearing-messages-to-imessage-right-now/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/img_0220.jpg</image:loc><image:title>IMG_0220</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/img_0219-1.jpg</image:loc><image:title>IMG_0219</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/img_0219.jpg</image:loc><image:title>IMG_0219</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/untitled-4.png</image:loc><image:title>Untitled 4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-03-04T07:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/02/23/three-questions-about-apple-encryption-and-the-u-k/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/1599px-the_union_flag_union_jack_uk_flag_326_7294538516.jpg</image:loc><image:title>SONY DSC</image:title><image:caption>SONY DSC</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-21.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-20.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-18.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-03-02T08:50:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/02/06/how-to-prove-false-statements-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-22T15:32:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/02/19/how-to-prove-false-statements-part-3/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/the_empire_of_light_belgium.jpg</image:loc><image:title>The_Empire_of_Light_Belgium</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/terminator1.jpg</image:loc><image:title>terminator1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-27T09:17:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2022/01/14/an-extremely-casual-code-review-of-metamasks-crypto/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/01/metamask_fox.svg_.png</image:loc><image:title>MetaMask_Fox.svg</image:title></image:image><lastmod>2025-02-19T16:52:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/02/12/u-k-asks-to-backdoor-icloud-backup-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/cdpw6tmsvts3tpwmyuvxz6-1200-80.png-1.webp</image:loc><image:title>Cdpw6TMsvTS3tPWmYuVXz6-1200-80.png</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-13T00:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/cuckoo-2-jpg.webp</image:loc><image:title>Cuckoo-2-jpg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-06T22:41:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/about-me/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/matthew-green.jpg</image:loc><image:title>Matthew Green</image:title></image:image><lastmod>2025-01-24T16:37:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2025/01/17/lets-talk-about-ai-and-end-to-end-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/apple-security-encryption.jpg</image:loc><image:title>apple-security-encryption</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/img_9881.jpg</image:loc><image:title>IMG_9881</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-26T00:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/52770168096_a43776424c_k.jpg</image:loc><image:title>52770168096_a43776424c_k</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-06T18:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2024/04/16/a-quick-post-on-chens-algorithm/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/04/20180405-ibm-q-quantum-computer-02.jpg</image:loc><image:title>20180405-ibm-q-quantum-computer-02</image:title></image:image><lastmod>2024-04-19T14:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/10/06/to-schnorr-and-beyond-part-1/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/elliptic-curve-cryptography-diagram.png</image:loc><image:title>elliptic-curve-cryptography-diagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/eqn2.png</image:loc><image:title>eqn2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/untitled-3.png</image:loc><image:title>untitled-3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/points-1.png</image:loc><image:title>points-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/schnorrpeikert-1.png</image:loc><image:title>schnorrpeikert-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-01-14T07:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/01/ios-17-iphone-14-pro-home-screen-airdrop-decline-accept.png</image:loc><image:title>ios-17-iphone-14-pro-home-screen-airdrop-decline-accept</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-01-13T06:49:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/11/30/to-schnorr-and-beyond-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/10/dilithium_crystals.webp</image:loc><image:title>Dilithium_crystals</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/11/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2023-12-05T09:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/euf-cma-and-suf-cma/</loc><lastmod>2023-11-30T16:53:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2023/08/21/some-rough-impressions-of-worldcoin/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/minority-report-20100419001352664-000.jpg</image:loc><image:title>minority-report-20100419001352664-000</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/08/complexity-and-uniqueness-of-human-iris-fine-textures-on-the-iris-form-unique-biometric.png</image:loc><image:title>complexity-and-uniqueness-of-human-iris-fine-textures-on-the-iris-form-unique-biometric</image:title></image:image><lastmod>2023-08-24T21:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/05/11/on-ashton-kutcher-and-secure-multi-party-computation/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/ashton-kutcher-600-5-717ec86008d64aafb74a46ef0d9159e6.jpg</image:loc><image:title>ashton-kutcher-600-5-717ec86008d64aafb74a46ef0d9159e6</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-05-16T02:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/05/08/prfs-prps-and-other-fantastic-things/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/05/2502854487_40328104e7_k.jpg</image:loc><image:title>2502854487_40328104e7_k</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/03/fe789-0thpoda9qmu8kvaco.png</image:loc><image:title>0*THPoDA9qmU8kVaCO</image:title></image:image><lastmod>2023-05-10T15:05:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/04/24/book-review-red-team-blues/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/04/9781250865847.jpg</image:loc><image:title>9781250865847</image:title></image:image><lastmod>2023-04-25T17:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/23/digital-fortress-i-read-it-so-you-dont/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/23fa7-digital-fortress.jpg</image:loc><image:title>23fa7-digital-fortress</image:title></image:image><lastmod>2023-04-17T13:25:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2023/03/23/remarks-on-chat-control/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/img_1868.jpg</image:loc><image:title>img_1868</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2023/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-03-31T22:11:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2022/12/07/apple-icloud-and-why-encrypted-backup-is-the-only-privacy-issue/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/12/1061312034_00b5614940_k.jpg</image:loc><image:title>1061312034_00b5614940_k</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/12/dc4bdf1973030717f16d02d3e44e3793.png</image:loc><image:title>dc4bdf1973030717f16d02d3e44e3793</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2021/12/2001-a-space-odyssey-1968-017-keir-dullea-reading-newspad.jpg</image:loc><image:title>2001-a-space-odyssey-1968-017-keir-dullea-reading-newspad</image:title></image:image><lastmod>2022-12-08T10:13:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2022/10/27/one-time-programs/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/chip.png</image:loc><image:title>chip</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-07T19:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2022/06/09/in-defense-of-cryptocurrency/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/5475007932_ebcd5cbcbf_c.jpg</image:loc><image:title>5475007932_ebcd5cbcbf_c</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/untitled-4-1.png</image:loc><image:title>untitled-4-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2022/06/image-12.png</image:loc><image:title>image-12</image:title></image:image><lastmod>2022-06-23T00:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2021/08/01/thinking-about-traceability/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2021/06/delhi_india_government.jpeg</image:loc><image:title>delhi_india_government</image:title></image:image><lastmod>2021-08-04T18:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2021/07/vlcsnap-2021-07-17-01h43m14s030-1-2048x1152-1.jpeg</image:loc><image:title>vlcsnap-2021-07-17-01h43m14s030-1-2048x1152-1</image:title></image:image><lastmod>2021-07-30T22:14:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2021/03/25/whats-in-your-browser-backup/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2021/03/icloud-drive-how-it-works-and-how-to-take-advantage-of-apples-cloud-1600x900-1.png</image:loc><image:title>icloud-drive-how-it-works-and-how-to-take-advantage-of-apples-cloud-1600x900-1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2021/03/1b02bd0d-d31d-47f5-aad8-c9874919d55d.png</image:loc><image:title>1b02bd0d-d31d-47f5-aad8-c9874919d55d</image:title></image:image><lastmod>2021-03-31T16:43:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/11/biz-google-524309146.jpg</image:loc><image:title>biz-google-524309146</image:title></image:image><lastmod>2020-12-10T03:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/08/12/attack-of-the-week-voice-calls-in-lte/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/08/cellular1.jpg</image:loc><image:title>cellular1</image:title></image:image><lastmod>2020-08-18T11:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/07/signalicon.png</image:loc><image:title>signalicon</image:title></image:image><lastmod>2020-07-18T20:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/04/03/does-zoom-use-end-to-end-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/04/zoombanner.jpg</image:loc><image:title>Zoombanner</image:title></image:image><lastmod>2020-04-11T12:42:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/03/06/earn-it-is-an-attack-on-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/03/static.politico.com_.jpg</image:loc><image:title>static.politico.com</image:title></image:image><lastmod>2020-03-20T02:57:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/password.jpeg</image:loc><image:title>password</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/opaqueprotocol.png</image:loc><image:title>opaqueprotocol</image:title><image:caption>OPAQUE protocol, excerpted from the paper.</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/pakediagram.png</image:loc><image:title>pakediagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/srpregister.png</image:loc><image:title>srpregister</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/srpthing.png</image:loc><image:title>srpthing</image:title><image:caption>Excerpt from Apple's 2016 BlackHat presentation on IKV.</image:caption></image:image><lastmod>2020-01-21T17:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2020/01/05/what-is-the-random-oracle-model-and-why-should-you-care-part-5/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2020/01/3357797069_d63ee832b0_o.jpg</image:loc><image:title>OLYMPUS DIGITAL CAMERA</image:title><image:caption>OLYMPUS DIGITAL CAMERA</image:caption></image:image><lastmod>2020-01-06T16:48:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/02/what-is-random-oracle-model-and-why/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/danielbleichen.jpg</image:loc><image:title>Danielbleichen</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/22841-rsalogo.gif</image:loc><image:title>22841-rsalogo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/c9d6a-inceptionscenes5.jpg</image:loc><image:title>c9d6a-inceptionscenes5</image:title></image:image><lastmod>2020-01-06T15:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2019/12/08/on-client-side-media-scanning/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/barr-fordham.jpg</image:loc><image:title>barr-fordham</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/barr.png</image:loc><image:title>barr</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/zoiks2.png</image:loc><image:title>zoiks2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/zoiks.png</image:loc><image:title>zoiks</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/xonn_table2.png</image:loc><image:title>xonn_table2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/xonn_table1.png</image:loc><image:title>xonn_table1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/badgerdogs.jpg</image:loc><image:title>badgerdogs</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/photodna2.png</image:loc><image:title>photodna2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/12/photodna.png</image:loc><image:title>photodna</image:title></image:image><lastmod>2019-12-10T11:49:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/10/apple-china-store-pudong.jpeg</image:loc><image:title>apple-china-store-pudong</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/10/apple-safari-ip-addresses-tencent-2.jpg</image:loc><image:title>apple-safari-ip-addresses-tencent-2</image:title></image:image><lastmod>2019-10-21T11:01:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2019/09/24/looking-back-at-the-snowden-revelations/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/snowden.png</image:loc><image:title>snowden</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/e2e.png</image:loc><image:title>e2e</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/bullrun.png</image:loc><image:title>bullrun</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/enabling.png</image:loc><image:title>enabling</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/schneier.png</image:loc><image:title>schneier</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/sigint.png</image:loc><image:title>sigint</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/sophisticated.png</image:loc><image:title>sophisticated</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/addedremoved.png</image:loc><image:title>addedremoved</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/addedremoved-1.jpg</image:loc><image:title>addedremoved</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/09/addedremoved.jpg</image:loc><image:title>addedremoved</image:title></image:image><lastmod>2019-10-08T03:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2019/06/05/how-does-apple-privately-find-your-offline-devices/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/06/lassiepic-1.png</image:loc><image:title>lassiepic</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/06/lassiepic.png</image:loc><image:title>lassiepic</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/06/filledinlassie.png</image:loc><image:title>FilledInLassie</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/06/lassie-1.png</image:loc><image:title>Lassie</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/06/lassie.png</image:loc><image:title>lassie</image:title></image:image><lastmod>2019-06-12T04:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/03/09/here-come-encryption-apps/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/03/9758d-silentphone.png</image:loc><image:title>9758d-silentphone</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/03/7994f-mitm.png</image:loc><image:title>7994f-mitm</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/03/1bfa2-cryptocathdln.png</image:loc><image:title>1bfa2-cryptocathdln</image:title></image:image><lastmod>2019-05-15T02:07:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/07/20/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/04/pkcs1pms.jpg</image:loc><image:title>pkcs1PMS</image:title></image:image><lastmod>2019-04-21T18:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/leakage.jpg</image:loc><image:title>leakage</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/fire__flame__database__server__security-512.png</image:loc><image:title>fire__flame__database__server__security-512</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/badgraph.png</image:loc><image:title>badgraph</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/glmpgraph-1.png</image:loc><image:title>GLMPgraph</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/glmpgraph.png</image:loc><image:title>GLMPgraph</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2019/02/leakage.png</image:loc><image:title>leakage</image:title></image:image><lastmod>2019-02-11T20:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/12/17/on-ghost-users-and-messaging-backdoors/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/12/01_general_gchq_poppy_air_9233_large.jpg</image:loc><image:title>gchq_poppy_air_9233_large</image:title><image:caption>gchq_poppy_air_9233_large</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/12/Identity.png</image:loc><image:title>Identity</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/12/GroupE2E.png</image:loc><image:title>GroupE2E</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/12/E2E.png</image:loc><image:title>E2E</image:title></image:image><lastmod>2018-12-24T17:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/should-you-use-srp/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/5aba95e2bd61b-image.jpg</image:loc><image:title>5aba95e2bd61b.image</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/10/srpdiagram.png</image:loc><image:title>srpdiagram</image:title></image:image><lastmod>2018-10-20T00:59:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/512px-google_chrome_icon_september_2014-svg.png</image:loc><image:title>512px-Google_Chrome_icon_(September_2014).svg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/thing1.png</image:loc><image:title>Thing</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/thing.png</image:loc><image:title>Thing</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/untitled-31.png</image:loc><image:title>Untitled 3</image:title><image:caption>What is even going on here? Who am I syncing to?</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/untitled-3.png</image:loc><image:title>Untitled 3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/untitled-2.png</image:loc><image:title>Untitled 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/img_3331.jpeg</image:loc><image:title>IMG_3331</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/09/foo.png</image:loc><image:title>foo</image:title></image:image><lastmod>2018-10-06T16:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/07/27/friday-dachshund-blogging/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/07/fba1babd-c60e-4ad9-a150-5d771bce8fa3.jpeg</image:loc><image:title>FBA1BABD-C60E-4AD9-A150-5D771BCE8FA3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/07/img_2806.jpeg</image:loc><image:title>IMG_2806</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/07/img_2124.jpeg</image:loc><image:title>IMG_2124</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/07/img_2397.jpeg</image:loc><image:title>IMG_2397</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/05/bk_09rdceaihm20.jpg</image:loc><image:title>Friday Dachshund Blogging - May 24, 2013</image:title></image:image><lastmod>2018-07-23T18:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/04/21/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-1/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/04/d87e2-attackencryption.png</image:loc><image:title>d87e2-attackencryption</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/04/53266-encdiagram.png</image:loc><image:title>53266-encdiagram</image:title></image:image><lastmod>2018-07-20T16:09:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/intuition-for-the-security-proof-of-f-o/</loc><lastmod>2018-07-20T15:42:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2018/05/17/was-the-efail-disclosure-horribly-screwed-up/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/05/efaillogo.png</image:loc><image:title>efaillogo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/05/proton.png</image:loc><image:title>Proton</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/05/efaildoc.png</image:loc><image:title>EfailDoc</image:title></image:image><lastmod>2018-05-23T17:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/04/26/a-few-thoughts-on-ray-ozzies-clear-proposal/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/04/iphone-x-silver-select-2017_av3.jpeg</image:loc><image:title>iphone-x-silver-select-2017_AV3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/04/dbptcoux4air3vy.jpg</image:loc><image:title>DbptcOuX4AIR3vy</image:title></image:image><lastmod>2018-05-03T11:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/why-ind-cpa-implies-randomized-encryption/</loc><lastmod>2018-04-24T13:20:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/winternitzcomplete.png</image:loc><image:title>WinternitzComplete</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/winternitz.png</image:loc><image:title>Winternitz</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/checksumforgery.png</image:loc><image:title>ChecksumForgery</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/2200px-hash_tree-svg.png</image:loc><image:title>2200px-hash_tree-svg</image:title><image:caption>Merkle tree, illustration from Wikipedia.</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/forgery1.png</image:loc><image:title>Forgery</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/forgery.png</image:loc><image:title>Forgery</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/lamportverify1.png</image:loc><image:title>LamportVerify</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/lamportverify.png</image:loc><image:title>LamportVerify</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/03/lamportillustration.png</image:loc><image:title>LamportIllustration</image:title></image:image><lastmod>2018-04-18T17:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/winternitz-checksum/</loc><lastmod>2018-03-31T17:32:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2018/02/17/a-few-notes-on-medsec-and-st-jude-medical/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/02/x0000_sjm_quadraassuramp20crt20d.jpg</image:loc><image:title>x0000_sjm_quadraassuramp20crt20d</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/security-certificate-has-expired.jpg</image:loc><image:title>security-certificate-has-expired</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/icdimplanted.jpeg</image:loc><image:title>icdimplanted</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/merlin-at-home-2.jpg</image:loc><image:title>merlin-at-home-2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/medtronic-programmer.jpg</image:loc><image:title>medtronic-programmer</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/energen_icd_900x960-dph.jpg</image:loc><image:title>energen_icd_900x960-dph</image:title></image:image><lastmod>2018-02-21T18:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/01/16/icloud-in-china/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/tuhao-gold-iphone-640x405.jpg</image:loc><image:title>tuhao-gold-iphone-640x405</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/untitled-6.png</image:loc><image:title>Untitled 6</image:title><image:caption>A list of HTTPS requests made during an iCloud backup from an iPhone. The bottom two addresses are Amazon and Google Cloud Services "blob" stores.</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/untitled-4.png</image:loc><image:title>Untitled 4</image:title></image:image><lastmod>2018-01-18T15:16:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/05/07/future-of-electronic-currency/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/05/chaum_1.jpg</image:loc><image:title>chaum_1</image:title></image:image><lastmod>2018-01-16T21:01:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/mallory5.jpg</image:loc><image:title>mallory5</image:title><image:caption>Why are we always worried about Mallory?</image:caption></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/img_12911.png</image:loc><image:title>IMG_1291</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/img_1291.png</image:loc><image:title>IMG_1291</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2018/01/whatsapp-icon.png</image:loc><image:title>whatsapp-icon</image:title></image:image><lastmod>2018-01-18T20:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/12/cap032.jpg</image:loc><image:title>cap032</image:title></image:image><lastmod>2018-01-02T13:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/11/08/a-few-thoughts-on-csrankings-org/</loc><lastmod>2017-11-15T12:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/10/23/attack-of-the-week-duhk/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/duck_1f986.png</image:loc><image:title>duck_1f986</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/thingthing.png</image:loc><image:title>ThingThing</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/ansi.png</image:loc><image:title>ansi</image:title></image:image><lastmod>2017-11-10T14:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/10/16/falling-through-the-kracks/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/logo-small.png</image:loc><image:title>logo-small</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/czx0o-twqaaeali.jpg</image:loc><image:title>czx0o-twqaaeali</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/wifihandshake.png</image:loc><image:title>wifihandshake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/10/393px-4-way-handshake-svg.png</image:loc><image:title>393px-4-way-handshake-svg</image:title></image:image><lastmod>2017-10-20T04:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/09/15/patching-is-hard-so-what/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/09/equifax-generic.jpg</image:loc><image:title>Equifax-Generic</image:title></image:image><lastmod>2017-09-17T23:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/07/02/beyond-public-key-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/6689264031_4c7516b3e1_z.jpg</image:loc><image:title>6689264031_4c7516b3e1_z</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/ibe1.png</image:loc><image:title>IBE</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/ibe.png</image:loc><image:title>IBE</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/abeformula.png</image:loc><image:title>ABEFormula</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/gates.png</image:loc><image:title>gates</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/iris.jpg</image:loc><image:title>iris</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/07/f64f315ec47f0b041e3d881177039414.jpg</image:loc><image:title>f64f315ec47f0b041e3d881177039414</image:title></image:image><lastmod>2017-07-06T07:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/boneh-franklin-ibe/</loc><lastmod>2017-07-03T00:52:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2017/03/05/secure-computing-for-journalists/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/03/640x960.jpg</image:loc><image:title>640x960</image:title></image:image><lastmod>2017-03-17T02:24:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/02/28/the-future-of-ransomware/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/02/google-self-driving-car-624x326.jpg</image:loc><image:title>google-self-driving-car-624x326</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/02/terminatorgenisys1-xlarge.jpg</image:loc><image:title>terminatorgenisys1-xlarge</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/02/cryptob1.jpg</image:loc><image:title>cryptob1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/02/ransomware.png</image:loc><image:title>ransomware</image:title></image:image><lastmod>2017-03-09T15:13:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/11/27/zero-knowledge-proofs-illustrated-primer/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/11/12725-hatsminusone.png</image:loc><image:title>12725-hatsminusone</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/11/538c4-hats.png</image:loc><image:title>538c4-hats</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/11/af15c-coloredgraph.png</image:loc><image:title>af15c-coloredgraph</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/11/d5db3-uncoloredgraph.png</image:loc><image:title>d5db3-uncoloredgraph</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/11/54b69-zk.jpg</image:loc><image:title>54b69-zk</image:title></image:image><lastmod>2017-01-21T22:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2017/01/21/zero-knowledge-proofs-an-illustrated-primer-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2017/01/2380271980_b2a66bd47d_z.jpg</image:loc><image:title>2380271980_b2a66bd47d_z</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorrextractoreqn1.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/completenessschnorr.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorrextractor.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorrextractoreqn.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorr1.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/completenessschnorr1.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorrextractor1.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/05/schnorr.png</image:loc><image:title>Zero Knowledge Proofs: An illustrated primer, Part 2</image:title></image:image><lastmod>2017-01-24T10:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/11/24/android-n-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/11/pixelphone.png</image:loc><image:title>pixelphone</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/11/credentialenc.png</image:loc><image:title>credentialenc</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/11/lockuserkey1.png</image:loc><image:title>lockuserkey</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/11/lockuserkey.png</image:loc><image:title>lockuserkey</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/11/apple.png</image:loc><image:title>apple</image:title></image:image><lastmod>2016-11-29T15:59:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/top-posts/</loc><lastmod>2016-08-31T17:59:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/c09d0-vulnerablesites.png</image:loc><image:title>c09d0-vulnerablesites</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/7b709-8251122311_a4779f152a_z.jpg</image:loc><image:title>7b709-8251122311_a4779f152a_z</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/61156-blockcipherencrypt.png</image:loc><image:title>61156-blockcipherencrypt</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/67a52-cbc_encryption.png</image:loc><image:title>67a52-cbc_encryption</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/947ba-cbcgoogle.png</image:loc><image:title>947ba-cbcgoogle</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/be09a-vulnerablesites.png</image:loc><image:title>be09a-vulnerablesites</image:title></image:image><lastmod>2016-10-13T16:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/all-posts/</loc><lastmod>2016-08-30T21:06:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2015/10/22/a-riddle-wrapped-in-curve/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/10/383ba-kryptos.jpg</image:loc><image:title>383ba-kryptos</image:title></image:image><lastmod>2016-10-19T23:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/11/introduction/</loc><lastmod>2016-08-30T15:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/11/when-things-fall-apart-part-1/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/47154-800px-a5-1_gsm_cipher-svg.png</image:loc><image:title>47154-800px-a5-1_gsm_cipher-svg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/703fb-ps3s.jpg</image:loc><image:title>703fb-ps3s</image:title></image:image><lastmod>2016-08-30T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/21/brief-diversion-beast-attack-on-tlsssl/</loc><lastmod>2016-08-30T14:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/23/where-things-fall-apart-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/62879-modern_protocol.png</image:loc><image:title>62879-modern_protocol</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/04fe1-classical_protocol.png</image:loc><image:title>04fe1-classical_protocol</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/21a99-ssl_intro_fig1.gif</image:loc><image:title>21a99-ssl_intro_fig1</image:title></image:image><lastmod>2016-08-30T14:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/24/where-things-fall-apart-protocols-part/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/5745a-dstplus.jpg</image:loc><image:title>5745a-dstplus</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/72cd1-chalrespproto.jpg</image:loc><image:title>72cd1-chalrespproto</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/0f758-pics2.jpg</image:loc><image:title>0f758-pics2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/bf611-pics.jpg</image:loc><image:title>bf611-pics</image:title></image:image><lastmod>2016-08-30T14:41:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/29/saving-byte/</loc><lastmod>2016-08-30T14:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/29/what-is-random-oracle-model-and-why-3/</loc><lastmod>2016-08-30T14:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/09/30/bram-cohen-corrected/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/09/e2a44-bram-cohen.jpg</image:loc><image:title>e2a44-bram-cohen</image:title></image:image><lastmod>2016-08-30T14:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/02/should-i-use-non-standard-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/b1cf2-crypto-1.png</image:loc><image:title>b1cf2-crypto-1</image:title></image:image><lastmod>2016-08-30T14:24:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/04/how-standards-go-wrong-constructive/</loc><lastmod>2016-08-30T14:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/08/what-is-random-oracle-model-and-why-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/4430509846_717f9aab2b_z.jpg</image:loc><image:title>4430509846_717f9aab2b_z</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/997c5-diagram.png</image:loc><image:title>997c5-diagram</image:title></image:image><lastmod>2016-08-30T14:17:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/11/desfire/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/desfire.jpg</image:loc><image:title>desfire</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/b3517-mifare.png</image:loc><image:title>b3517-mifare</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/7ae58-img_9223clippercardpack.jpg</image:loc><image:title>7ae58-img_9223clippercardpack</image:title></image:image><lastmod>2016-08-30T14:02:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/12/oh-my/</loc><lastmod>2016-08-30T13:52:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/20/what-is-random-oracle-model-and-why_20/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/44634-book-signing.jpg</image:loc><image:title>44634-book-signing</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/10/56614-diagram.jpg</image:loc><image:title>56614-diagram</image:title></image:image><lastmod>2016-08-30T13:43:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/10/23/attack-of-week-xml-encryption/</loc><lastmod>2016-08-30T13:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/04/on-symbol-signs-adversary-and-better/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/b68a0-diagram.png</image:loc><image:title>b68a0-diagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/13639-baby.jpg</image:loc><image:title>13639-baby</image:title></image:image><lastmod>2016-08-30T02:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/07/in-defense-of-applied-cryptography/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/f92c6-603255.jpg</image:loc><image:title>f92c6-603255</image:title></image:image><lastmod>2016-08-30T02:41:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/09/how-not-to-redact-document-nhtsa-and/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/43a98-dutycycleredaction.jpg</image:loc><image:title>43a98-dutycycleredaction</image:title></image:image><lastmod>2016-08-30T02:40:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/10/format-preserving-encryption-or-how-to/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/feistel.gif</image:loc><image:title>feistel</image:title></image:image><lastmod>2016-08-30T02:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/14/first-rule-of-vulnerability/</loc><lastmod>2016-08-30T02:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/14/update-on-our-contest/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/3278e-adversaries_adult.jpg</image:loc><image:title>3278e-adversaries_adult</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/fe251-baby_adversary.jpg</image:loc><image:title>fe251-baby_adversary</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/3a7ac-thomas_adversary.jpg</image:loc><image:title>3a7ac-thomas_adversary</image:title></image:image><lastmod>2016-08-30T02:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/22/neat-research-ideas-that-went-nowhere/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/b4dab-brains.jpg</image:loc><image:title>b4dab-brains</image:title></image:image><lastmod>2016-08-30T02:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/24/bram-cohen-corrects-me/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/11/2551c-bramcohendontbecreepy.jpg</image:loc><image:title>2551c-bramcohendontbecreepy</image:title></image:image><lastmod>2016-08-30T02:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/28/non-governmental-crypto-attacks/</loc><lastmod>2016-08-30T02:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/29/is-this-face-of-human-error/</loc><lastmod>2016-08-30T02:18:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/11/30/academic-vs-commercial-cryptographers/</loc><lastmod>2016-09-26T11:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/01/how-not-to-use-symmetric-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/12/brass_key_corkscrew12.jpg</image:loc><image:title>brass_key_corkscrew12</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/12/55352-reusingivs.png</image:loc><image:title>55352-reusingivs</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/12/5345b-software_ecb.png</image:loc><image:title>5345b-software_ecb</image:title></image:image><lastmod>2016-08-30T02:15:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/04/matt-green-smackdown-watch-are-aead/</loc><lastmod>2016-08-30T01:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/06/is-there-enigma-bubble/</loc><lastmod>2016-08-30T01:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/12/liveblogging-wwii-december-12-1941/</loc><lastmod>2016-08-30T01:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/12/paul-kocher/</loc><lastmod>2016-08-30T01:40:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/14/programming-note/</loc><lastmod>2016-08-30T01:39:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/15/whats-deal-with-rc4/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/12/rc4.png</image:loc><image:title>RC4</image:title></image:image><lastmod>2016-08-29T23:17:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/21/question-for-you/</loc><lastmod>2016-08-29T23:10:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/23/brief-note-on-end-of-year-giving/</loc><lastmod>2016-08-29T23:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/24/whats-tls-snap-start/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2011/12/sugar-snap-peas.jpg</image:loc><image:title>sugar-snap-peas</image:title></image:image><lastmod>2016-08-29T23:08:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2011/12/29/2011-redux/</loc><lastmod>2016-08-29T22:42:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/02/openssl-and-nss-are-fips-140-certified/</loc><lastmod>2016-08-29T22:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/02/very-casual-introduction-to-fully/</loc><lastmod>2016-08-29T21:59:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/10/attack-of-week-datagram-tls/</loc><lastmod>2016-08-29T14:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/12/useful-cryptography-resources/</loc><lastmod>2016-08-29T14:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/16/eax-provable-security-knight-rider-and/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/01/knight-rider.jpg</image:loc><image:title>knight-rider</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/01/9f34f-djbtweet.png</image:loc><image:title>9f34f-djbtweet</image:title></image:image><lastmod>2016-08-29T14:40:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/22/in-memorium-tim-hartnell/</loc><lastmod>2016-08-29T14:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/26/tor-and-great-firewall-of-china/</loc><lastmod>2016-08-29T14:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/01/30/bad-movie-cryptography-of-week/</loc><lastmod>2016-08-29T14:35:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/02/multiple-encryption/</loc><lastmod>2016-08-29T14:28:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/05/sattelite-phone-encryption-is-terrible/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/baa0f-a52.png</image:loc><image:title>baa0f-a52</image:title></image:image><lastmod>2016-08-29T14:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/09/trustwave-announces-name-change/</loc><lastmod>2016-08-29T14:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/14/quick-hit-ssl-mitm-update/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/trustwavelogo.png</image:loc><image:title>trustwavelogo</image:title></image:image><lastmod>2016-08-29T14:17:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/15/rsa-keys-no-insight-whatsoever/</loc><lastmod>2016-08-29T14:14:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/21/random-number-generation-illustrated/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/shrinking.jpg</image:loc><image:title>shrinking</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/random.gif</image:loc><image:title>random</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/76fa5-dice.jpeg</image:loc><image:title>76fa5-dice</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/6d647-ansix9prg.png</image:loc><image:title>6d647-ansix9prg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/f02ea-twoprgs.gif</image:loc><image:title>f02ea-twoprgs</image:title></image:image><lastmod>2016-08-29T14:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/02/28/how-to-fix-internet/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/hash_tree-svg.png</image:loc><image:title>Hash_Tree.svg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/02/man_in_the_middle_attack-svg.png</image:loc><image:title>Man_in_the_middle_attack.svg</image:title></image:image><lastmod>2016-08-29T13:34:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/03/01/ca-nonsense-brief-update/</loc><lastmod>2016-08-29T13:28:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/03/09/surviving-bad-rng/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/03/rsa-pss.gif</image:loc><image:title>rsa-pss</image:title></image:image><lastmod>2016-08-29T13:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/03/15/how-do-interception-proxies-fail/</loc><lastmod>2016-08-29T13:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/03/19/why-antisec-matters/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/03/antisec-logo-100337062-orig.jpg</image:loc><image:title>antisec-logo-100337062-orig</image:title></image:image><lastmod>2016-08-29T13:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/02/poker-is-hard-especially-for/</loc><lastmod>2016-08-29T13:16:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/05/icloud-who-holds-key/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/7a059-icloud.png</image:loc><image:title>7a059-icloud</image:title></image:image><lastmod>2016-08-29T13:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/11/its-end-of-world-as-we-know-it-and-i/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/qkdrig.jpeg</image:loc><image:title>untitled</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/shor_big.gif</image:loc><image:title>Shor_big</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/quantumleap_00.jpg</image:loc><image:title>quantumleap_00</image:title></image:image><lastmod>2016-08-29T13:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/16/so-long-false-start-we-hardly-knew-ya/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/14b7f-falsestartgraph.png</image:loc><image:title>14b7f-falsestartgraph</image:title></image:image><lastmod>2016-08-29T13:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/27/wonk-post-circular-security/</loc><lastmod>2016-08-29T12:56:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/04/30/update-on-tls-mitm-situation/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/04/bbc79-spreadsheet.png</image:loc><image:title>bbc79-spreadsheet</image:title></image:image><lastmod>2016-08-29T12:48:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/05/13/tale-of-two-patches/</loc><lastmod>2016-08-29T12:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/05/19/how-to-choose-authenticated-encryption/</loc><lastmod>2016-08-29T12:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/05/22/if-wishes-were-horses-then-beggars/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/05/d25cc-6503040565_cc439de4f7_z.jpg</image:loc><image:title>d25cc-6503040565_cc439de4f7_z</image:title></image:image><lastmod>2016-08-29T12:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/05/30/tack/</loc><lastmod>2016-08-29T12:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/06/03/posts-so-far/</loc><lastmod>2016-08-29T04:38:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/06/05/flame-certificates-collisions-oh-my/</loc><lastmod>2016-08-29T04:36:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/06/21/bad-couple-of-years-for-cryptographic/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/06/42c2e-numdecryptions.png</image:loc><image:title>42c2e-numdecryptions</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/06/d5cac-etoken.jpg</image:loc><image:title>d5cac-etoken</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/06/910ae-table2-tiff.jpg</image:loc><image:title>910ae-table2-tiff</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/06/84d30-table3.png</image:loc><image:title>84d30-table3</image:title></image:image><lastmod>2016-08-29T04:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/07/17/indifferentiability/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/07/085e6-damgard.png</image:loc><image:title>085e6-damgard</image:title></image:image><lastmod>2016-08-29T04:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/07/24/four-theories-on-cryptography-of-star/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/07/frameofmind.jpg</image:loc><image:title>frameofmind</image:title></image:image><lastmod>2016-08-29T04:05:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/08/08/a-note-on-missing-post/</loc><lastmod>2016-08-29T03:59:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/08/15/on-gauss/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/gauss.png</image:loc><image:title>gauss</image:title></image:image><lastmod>2016-08-29T03:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/08/19/dear-apple-please-set-imessage-free/</loc><lastmod>2016-08-29T03:52:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/08/27/reposted-cryptanalysis-of-hdcp-v2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/bcc8e-localitycheck_pc.png</image:loc><image:title>bcc8e-localitycheck_pc</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/38e4e-localitycheck_normal.png</image:loc><image:title>38e4e-localitycheck_normal</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/24eff-localitycheck_pc.png</image:loc><image:title>24eff-localitycheck_pc</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/ca9c5-km_encryption.png</image:loc><image:title>ca9c5-km_encryption</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/15ae4-localitycheck_normal.png</image:loc><image:title>15ae4-localitycheck_normal</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/08/836e8-hdcp_nostored-tiff.jpg</image:loc><image:title>836e8-hdcp_nostored-tiff</image:title></image:image><lastmod>2016-08-29T03:50:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/09/03/amazons-acceptable-usage-policy-isnt/</loc><lastmod>2016-08-29T03:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/09/06/on-provable-security-of-tls-part-1/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/09/sy10660a.gif</image:loc><image:title>sy10660a</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/09/c5796-tlsdiagram3.jpg</image:loc><image:title>c5796-tlsdiagram3</image:title></image:image><lastmod>2016-08-29T03:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/09/28/on-provable-security-of-tls-part-2/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/09/5c892-ciphertext3.png</image:loc><image:title>5c892-ciphertext3</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/09/43fae-ciphertext2.png</image:loc><image:title>43fae-ciphertext2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/09/40e8a-ciphertext.png</image:loc><image:title>40e8a-ciphertext</image:title></image:image><lastmod>2016-08-29T03:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/10/03/long-live-sha3/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/10/79655-ketchup.png</image:loc><image:title>79655-ketchup</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/10/29c41-sponge.png</image:loc><image:title>29c41-sponge</image:title></image:image><lastmod>2016-08-29T03:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/10/09/so-you-want-to-use-alternative-cipher/</loc><lastmod>2016-10-10T15:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/10/16/the-crypto-dream/</loc><lastmod>2016-08-29T03:15:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/10/27/attack-of-week-cross-vm-timing-attacks/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/10/a1858-results.png</image:loc><image:title>a1858-results</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/10/1e9d6-squaremultiply.png</image:loc><image:title>1e9d6-squaremultiply</image:title></image:image><lastmod>2016-08-29T03:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/11/24/lets-talk-about-zrtp/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/11/18558-zrtpconfirm.png</image:loc><image:title>18558-zrtpconfirm</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/11/16d5a-zrtp_overview.png</image:loc><image:title>16d5a-zrtp_overview</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2012/11/b2b22-zooko-zrtp-h3-big.jpg</image:loc><image:title>b2b22-zooko-zrtp-h3-big</image:title></image:image><lastmod>2016-09-10T11:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2012/12/28/the-anatomy-of-bad-idea/</loc><lastmod>2016-09-09T21:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/01/04/ubiquitous-surveillance-works-lets-have/</loc><lastmod>2016-08-29T02:45:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/01/25/in-defense-of-provable-security/</loc><lastmod>2016-08-29T02:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/02/04/attack-of-week-tls-timing-oracles/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/02/20922-cycles.png</image:loc><image:title>20922-cycles</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/02/96cf7-tlsrecord1.png</image:loc><image:title>96cf7-tlsrecord1</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/02/3715d-tlsrecord2.png</image:loc><image:title>3715d-tlsrecord2</image:title></image:image><lastmod>2016-08-29T02:37:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/02/15/why-i-hate-cbc-mac/</loc><lastmod>2016-08-29T02:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/02/22/cryptography-is-systems-problem-video/</loc><lastmod>2016-08-29T02:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/a-note-on-the-icloud-experiment/</loc><lastmod>2016-08-28T23:30:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/2013/03/12/attack-of-week-rc4-is-kind-of-broken-in/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/03/f225a-rc4.png</image:loc><image:title>f225a-rc4</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/03/fffac-plaintextrec1.png</image:loc><image:title>fffac-plaintextrec1</image:title></image:image><lastmod>2016-08-22T14:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/04/11/wonkery-mailbag-ideal-ciphers/</loc><lastmod>2016-08-22T14:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/04/11/zerocoin-making-bitcoin-anonymous/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/04/zerocoin.png</image:loc><image:title>zerocoin</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/04/92023-zerocoinchain.png</image:loc><image:title>92023-zerocoinchain</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/04/8fdab-bitcoinchain.png</image:loc><image:title>8fdab-bitcoinchain</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/04/61eee-bitcoinpress.png</image:loc><image:title>61eee-bitcoinpress</image:title></image:image><lastmod>2016-08-22T14:25:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/05/14/a-few-thoughts-on-cellular-encryption/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/05/6a1c3-3gproposal.png</image:loc><image:title>6a1c3-3gproposal</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/05/b3daa-gsmauth.gif</image:loc><image:title>b3daa-gsmauth</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/05/cb7be-stingray.jpg</image:loc><image:title>OLYMPUS DIGITAL CAMERA</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/05/85235-3gaka.jpg</image:loc><image:title>85235-3gaka</image:title></image:image><lastmod>2016-08-22T14:19:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/06/17/how-to-backdoor-encryption-app/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/06/7a600-stasicryptocat.png</image:loc><image:title>7a600-stasicryptocat</image:title></image:image><lastmod>2016-08-22T14:14:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/09/09/lets-talk-about-imessage-again/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/09/c8328-lotsofdeviecs.png</image:loc><image:title>c8328-lotsofdeviecs</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/09/340d9-mail_linked_to_mac.png</image:loc><image:title>340d9-mail_linked_to_mac</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/09/dbc47-phonetokey.jpg</image:loc><image:title>dbc47-phonetokey</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/09/37997-gizmodo.png</image:loc><image:title>37997-gizmodo</image:title></image:image><lastmod>2016-08-22T14:10:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/c5ba9-attachmentcontents.png</image:loc><image:title>c5ba9-attachmentcontents</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/ad62e-results.png</image:loc><image:title>ad62e-results</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/d87e2-attackencryption.png</image:loc><image:title>d87e2-attackencryption</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/53266-encdiagram.png</image:loc><image:title>53266-encdiagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/0abd5-img_8327-crop.jpg</image:loc><image:title>0abd5-img_8327-crop</image:title></image:image><lastmod>2016-08-22T14:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/06/26/can-apple-read-your-imessages/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/06/00420-phonetokey.jpg</image:loc><image:title>00420-phonetokey</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/06/2f89b-gizmodo.png</image:loc><image:title>2f89b-gizmodo</image:title></image:image><lastmod>2016-08-22T14:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/07/20/tweetnacl/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/07/00f70-tweetnacl.png</image:loc><image:title>00f70-tweetnacl</image:title></image:image><lastmod>2016-08-22T14:03:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/08/19/is-cryptopocalypse-nigh/</loc><lastmod>2016-08-22T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/09/06/on-nsa/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/ed0c0-redaction.png</image:loc><image:title>ed0c0-redaction</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/cf9d3-sslmarketshare.png</image:loc><image:title>cf9d3-sslmarketshare</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/0aaf2-surveillance.png</image:loc><image:title>0aaf2-surveillance</image:title></image:image><lastmod>2016-08-22T13:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/09/10/a-note-on-nsa-future-and-fixing-mistakes/</loc><lastmod>2016-08-22T13:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/09/18/the-many-flaws-of-dualecdrbg/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/718b9-openssldrbg.png</image:loc><image:title>718b9-openssldrbg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/db26e-qvalue256.png</image:loc><image:title>db26e-qvalue256</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/ceaf3-shumowfergusonannotated.png</image:loc><image:title>ceaf3-shumowfergusonannotated</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/09/b9dec-dual_ec_diagram.png</image:loc><image:title>b9dec-dual_ec_diagram</image:title></image:image><lastmod>2016-08-22T13:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/09/20/rsa-warns-developers-against-its-own/</loc><lastmod>2016-08-21T18:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/10/14/lets-audit-truecrypt/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/10/1d2f9-auditallthethings.png</image:loc><image:title>1d2f9-auditallthethings</image:title></image:image><lastmod>2016-08-21T18:51:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/12/03/how-does-nsa-break-ssl/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/521c5-redaction.png</image:loc><image:title>521c5-redaction</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/5929d-bullrun.png</image:loc><image:title>5929d-bullrun</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/9da80-redaction.png</image:loc><image:title>9da80-redaction</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/7ecd1-lockbroke.png</image:loc><image:title>7ecd1-lockbroke</image:title></image:image><lastmod>2016-08-21T18:44:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/12/20/an-update-on-truecrypt/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/3e85e-chart.png</image:loc><image:title>3e85e-chart</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/3948d-truecryptlogo.png</image:loc><image:title>3948d-truecryptlogo</image:title></image:image><lastmod>2016-08-21T18:38:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/12/28/can-hackers-decrypt-targets-pin-data/</loc><lastmod>2016-08-21T18:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2013/12/28/a-few-more-notes-on-nsa-random-number/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/ac4f1-defaultmoduli.png</image:loc><image:title>ac4f1-defaultmoduli</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2013/12/40870-members.png</image:loc><image:title>40870-members</image:title></image:image><lastmod>2016-08-21T18:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/01/25/a-letter-from-us-security-researchers/</loc><lastmod>2016-08-21T18:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfuscation-and/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/02/22fab-obfuscated.png</image:loc><image:title>22fab-obfuscated</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/02/bd69f-breakthrough.png</image:loc><image:title>bd69f-breakthrough</image:title></image:image><lastmod>2016-08-21T18:22:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/03/19/how-do-you-know-if-rng-is-working/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/03/f31c5-intelbackdoor.jpg</image:loc><image:title>f31c5-intelbackdoor</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/03/12f1f-rngdiagrams.png</image:loc><image:title>12f1f-rngdiagrams</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/03/32ff5-cartoon.jpg</image:loc><image:title>32ff5-cartoon</image:title></image:image><lastmod>2016-08-21T18:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/11/12/why-tor-attack-matters/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/11/f17a2-1447259626008648.jpeg</image:loc><image:title>f17a2-1447259626008648</image:title></image:image><lastmod>2016-08-16T13:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/03/01/attack-of-week-drown/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/d29fd-zombies.jpg</image:loc><image:title>d29fd-zombies</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/47811-tlscountermeasure.png</image:loc><image:title>47811-tlscountermeasure</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/48842-magnacarta.jpg</image:loc><image:title>48842-magnacarta</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/325ff-ssl_handshake_rsa.jpg</image:loc><image:title>325ff-ssl_handshake_rsa</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/03/e9f79-iso-beware-drowning-warning-symbol-is-2057.png</image:loc><image:title>e9f79-iso-beware-drowning-warning-symbol-is-2057</image:title></image:image><lastmod>2016-08-15T14:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/08/13/is-apples-cloud-key-vault-crypto/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/23115-blender.png</image:loc><image:title>23115-blender</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/ba59a-pickle.png</image:loc><image:title>ba59a-pickle</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/08/43d26-vault.png</image:loc><image:title>43d26-vault</image:title></image:image><lastmod>2016-10-30T23:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/04/24/attack-of-week-triple-handshakes-3shake/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/c8e19-triplehand2.png</image:loc><image:title>c8e19-triplehand2</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/55b08-handshake_rsa.png</image:loc><image:title>55b08-handshake_rsa</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/a30bf-renegotiationhandshake.png</image:loc><image:title>a30bf-renegotiationhandshake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/1e33c-resumption-tiff.jpg</image:loc><image:title>1e33c-resumption-tiff</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/79fcc-crazyhandshake.png</image:loc><image:title>79fcc-crazyhandshake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/a4802-renegotiation.png</image:loc><image:title>a4802-renegotiation</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/b7627-raydispensa.png</image:loc><image:title>b7627-raydispensa</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/6128e-twohandshakes.png</image:loc><image:title>6128e-twohandshakes</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/e4ad6-dhhandshake.png</image:loc><image:title>e4ad6-dhhandshake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/04/309ca-rsahandshake.png</image:loc><image:title>309ca-rsahandshake</image:title></image:image><lastmod>2016-07-29T04:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/07/26/noodling-about-im-protocols/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/de88e-cryptocatreflection.png</image:loc><image:title>de88e-cryptocatreflection</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/a74bc-cryptocathandshake.png</image:loc><image:title>a74bc-cryptocathandshake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/42453-cryptocatmitm.png</image:loc><image:title>42453-cryptocatmitm</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/b6559-otr_message.png</image:loc><image:title>b6559-otr_message</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/f65f8-otrake.png</image:loc><image:title>f65f8-otrake</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/8a61e-chats.png</image:loc><image:title>8a61e-chats</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/07/cb4fb-stasicryptocat.png</image:loc><image:title>cb4fb-stasicryptocat</image:title></image:image><lastmod>2016-07-29T04:42:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/08/13/whats-matter-with-pgp/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/signalstring.jpg</image:loc><image:title>signalstring</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/6443976239_b20c3cbb28_m.jpg</image:loc><image:title>6443976239_b20c3cbb28_m</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/2a5fe-willsmith.jpg</image:loc><image:title>2a5fe-willsmith</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/a6eef-pkz.png</image:loc><image:title>a6eef-pkz</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/0f936-keyid.png</image:loc><image:title>0f936-keyid</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/58cb1-recvkeysworks.png</image:loc><image:title>58cb1-recvkeysworks</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/08/ba0d3-keys.png</image:loc><image:title>ba0d3-keys</image:title></image:image><lastmod>2016-07-29T04:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/09/23/slate-piece/</loc><lastmod>2016-07-29T04:04:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/10/04/why-cant-apple-decrypt-your-iphone/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/apple_computer_logo_rainbow-svg.png</image:loc><image:title>Apple_Computer_Logo_rainbow.svg</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/imessage-bad1.jpg</image:loc><image:title>imessage-bad</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/4452d-secureenclaveboot.png</image:loc><image:title>4452d-secureenclaveboot</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/20e81-applediagram.png</image:loc><image:title>20e81-applediagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/b6cdb-uid.png</image:loc><image:title>b6cdb-uid</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/7e8de-appleencryption.png</image:loc><image:title>7e8de-appleencryption</image:title></image:image><lastmod>2016-07-29T03:58:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/10/15/attack-of-week-poodle/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/4241034941_3188086980_m.jpg</image:loc><image:title>4241034941_3188086980_m</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/e7e82-cookiepost.png</image:loc><image:title>e7e82-cookiepost</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/2d660-black-poodle-chjaset.jpg</image:loc><image:title>2d660-black-poodle-chjaset</image:title></image:image><lastmod>2016-07-29T03:44:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/10/29/attack-of-week-unpicking-plaid/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/c7da3-chartcards.png</image:loc><image:title>c7da3-chartcards</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/4df27-plaidcbc.png</image:loc><image:title>4df27-plaidcbc</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/3cac3-plaidauth.png</image:loc><image:title>3cac3-plaidauth</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/37415-germantank.png</image:loc><image:title>37415-germantank</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/11a3f-badprotocol.png</image:loc><image:title>11a3f-badprotocol</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/11979-rfidsleeves.jpg</image:loc><image:title>11979-rfidsleeves</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/ef77e-slashdot.png</image:loc><image:title>ef77e-slashdot</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/a437e-plaidmodel.png</image:loc><image:title>a437e-plaidmodel</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/10/413ba-477913951_1cc1d9c36c_m.jpg</image:loc><image:title>413ba-477913951_1cc1d9c36c_m</image:title></image:image><lastmod>2016-07-29T03:38:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/12/29/on-new-snowden-documents/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/64756-undercover_coresecrets.png</image:loc><image:title>64756-undercover_coresecrets</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/4427e-rsaattack.png</image:loc><image:title>4427e-rsaattack</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/80448-coresecrets.png</image:loc><image:title>80448-coresecrets</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/bc068-exploitation.png</image:loc><image:title>bc068-exploitation</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/5ca6c-torthing.png</image:loc><image:title>5ca6c-torthing</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/e2a1e-responseto.png</image:loc><image:title>e2a1e-responseto</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2014/12/50e15-tundra.png</image:loc><image:title>50e15-tundra</image:title></image:image><lastmod>2016-07-28T01:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/01/14/hopefully-last-post-ill-ever-write-on/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/01/25d4b-members.png</image:loc><image:title>25d4b-members</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/01/8e835-altpointsnist.png</image:loc><image:title>8e835-altpointsnist</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/01/bb617-kelseyemail.png</image:loc><image:title>bb617-kelseyemail</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/01/2fe7c-cygnacom.png</image:loc><image:title>2fe7c-cygnacom</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/01/2d346-amslogo.jpg</image:loc><image:title>2d346-amslogo</image:title></image:image><lastmod>2016-07-28T01:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/02/10/how-do-we-pay-for-privacy/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/02/9e701-4948130073_1e705999df_z.jpg</image:loc><image:title>9e701-4948130073_1e705999df_z</image:title></image:image><lastmod>2016-07-28T01:49:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/02/18/another-update-on-truecrypt-audit/</loc><lastmod>2016-07-28T01:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/02/19/how-to-paint-yourself-into-corner/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/02/c789a-badkey.png</image:loc><image:title>c789a-badkey</image:title></image:image><lastmod>2016-07-28T01:19:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/03/03/attack-of-week-freak-or-factoring-nsa/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/03/958d7-nsa-fake2bcopy.png</image:loc><image:title>958d7-nsa-fake2bcopy</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/03/85d8d-walking-dead.jpg</image:loc><image:title>85d8d-walking-dead</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/03/a5ff6-nadiafactoring.png</image:loc><image:title>a5ff6-nadiafactoring</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/03/6e97d-nsa-careersjpeg.jpg</image:loc><image:title>6e97d-nsa-careersjpeg</image:title></image:image><lastmod>2016-07-28T01:14:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/07/28/statement-on-dmca-lawsuit/</loc><lastmod>2016-07-28T00:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/04/02/truecrypt-report/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/bfb21-truecryptlogo.png</image:loc><image:title>bfb21-truecryptlogo</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/9acd1-truecrypt.png</image:loc><image:title>9acd1-truecrypt</image:title></image:image><lastmod>2016-10-02T07:23:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/04/16/how-do-we-build-encryption-backdors/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/3e97d-fingerprint.png</image:loc><image:title>3e97d-fingerprint</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/c27ea-leaffield.png</image:loc><image:title>c27ea-leaffield</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/4be27-flowchart.png</image:loc><image:title>4be27-flowchart</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/04/7ea61-phonetokey.jpg</image:loc><image:title>7ea61-phonetokey</image:title></image:image><lastmod>2016-07-19T00:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/05/22/attack-of-week-logjam/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/05/10560832436_f7d4eb635c_z.jpg</image:loc><image:title>10560832436_f7d4eb635c_z</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/05/50522-nsa_combined.png</image:loc><image:title>50522-nsa_combined</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/05/18dac-diagram.png</image:loc><image:title>18dac-diagram</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/05/9a480-keytable.png</image:loc><image:title>9a480-keytable</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/05/53aff-tlsserverparams.png</image:loc><image:title>53aff-tlsserverparams</image:title></image:image><lastmod>2016-07-19T00:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/08/16/the-network-is-hostile/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/08/2ddf9-addedremove.png</image:loc><image:title>2ddf9-addedremove</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/08/a7ee8-att-logo.jpg</image:loc><image:title>a7ee8-att-logo</image:title></image:image><lastmod>2016-07-19T00:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/07/20/a-history-of-backdoors/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/07/efcff-logjamchrome.png</image:loc><image:title>efcff-logjamchrome</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/07/79f32-640px-myk-78_clipper_chip_markings.jpg</image:loc><image:title>79f32-640px-myk-78_clipper_chip_markings</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/07/dddcc-clippertriangle.png</image:loc><image:title>dddcc-clippertriangle</image:title></image:image><lastmod>2016-07-19T00:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2015/12/22/on-juniper-backdoor/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/12/b32a3-whacko.png</image:loc><image:title>b32a3-whacko</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/12/33080-jtbmlh1450766921.jpg</image:loc><image:title>33080-jtbmlh1450766921</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/12/a826e-juniperberries.png</image:loc><image:title>a826e-juniperberries</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2015/12/93863-dice.jpeg</image:loc><image:title>93863-dice</image:title></image:image><lastmod>2016-07-18T23:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2016/06/15/what-is-differential-privacy/</loc><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/06/ac32b-federighi_hero20120727.png</image:loc><image:title>ac32b-federighi_hero20120727</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/06/c14a2-surveillance_cameras.jpg</image:loc><image:title>c14a2-surveillance_cameras</image:title></image:image><image:image><image:loc>https://blog.cryptographyengineering.com/wp-content/uploads/2016/06/11738-frederikson.png</image:loc><image:title>11738-frederikson</image:title></image:image><lastmod>2016-09-08T23:46:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/2014/04/08/attack-of-the-week-openssl-heartbleed/</loc><lastmod>2014-04-29T15:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.cryptographyengineering.com/some-thoughts-on-suborning-encryption-chips/</loc><lastmod>2013-12-01T17:23:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/useful-cryptography-resources/</loc><lastmod>2013-06-19T00:57:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/how-bitcoin-actually-works/</loc><lastmod>2013-05-29T21:44:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/table-of-contents/</loc><lastmod>2013-06-02T17:28:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/a-footnote-on-collision-resistance/</loc><lastmod>2012-07-17T17:58:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com/a-note-on-blind-signature-schemes/</loc><lastmod>2013-03-19T08:20:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.cryptographyengineering.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-01T21:17:05+00:00</lastmod></url></urlset>
