Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Cryptography

What do La Croix, octonions, and Second Life have in common? January 2, 2019
CSAW CTF Crypto Challenge: Breaking DSA December 17, 2018
We crypto now November 7, 2018
A Guide to Post-Quantum Cryptography October 22, 2018
Introduction to Verifiable Delay Functions (VDFs) October 12, 2018
Fault Analysis on RSA Signing August 14, 2018
You could have invented that Bluetooth attack August 1, 2018
Start using the Secure Enclave Crypto API June 28, 2016
Apple can comply with the FBI court order February 17, 2016
Let’s Encrypt the Internet January 5, 2016

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • Symbolic Path Merging in Manticore
  • Fuzzing an API with DeepState (Part 2)
  • Fuzzing an API with DeepState (Part 1)
  • How McSema Handles C++ Exceptions
  • Empire Hacking: Ethereum Edition 2
  • How to write a rootkit without really trying
  • On Bounties and Boffins
  • What do La Croix, octonions, and Second Life have in common?
  • Fuzzing Like It’s 1989
  • $10,000 research fellowships for underrepresented talent
  • CSAW CTF Crypto Challenge: Breaking DSA
  • 10 Rules for the Secure Use of Cryptocurrency Hardware Wallets
  • Return of the Blockchain Security Empire Hacking
  • Trail of Bits @ Devcon IV Recap
  • We crypto now

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (9)
  • Attacks (6)
  • Authentication (4)
  • Binary Ninja (8)
  • Blockchain (18)
  • Capture the Flag (10)
  • Compilers (15)
  • Conferences (17)
  • Cryptography (12)
  • Cyber Grand Challenge (7)
  • Dynamic Analysis (6)
  • Education (11)
  • Empire Hacking (6)
  • Engineering Practice (4)
  • Events (5)
  • Exploits (15)
  • Fuzzing (13)
  • Guides (7)
  • Internship Projects (5)
  • iVerify (2)
  • Malware (6)
  • Manticore (8)
  • McSema (10)
  • Meta (9)
  • Mitigations (8)
  • osquery (13)
  • Paper Review (1)
  • Press Release (14)
  • Privacy (6)
  • Products (4)
  • Program Analysis (11)
  • Research Practice (1)
  • Reversing (8)
  • Rust (1)
  • Sponsorships (12)
  • Static Analysis (11)
  • Symbolic Execution (9)
  • Year in Review (4)
My Tweets
Cancel