<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title>cr.yp.to blog</title>
<description>D. J. Bernstein's personal weblog.</description>
<language>en-us</language>
<link>http://blog.cr.yp.to</link>
<ttl>600</ttl>
<item>
<title>NSA and IETF, part 7</title>
<description>Counting votes. #pqcrypto #hybrids #nsa #ietf #voting</description>
<link>http://blog.cr.yp.to/20260405-votes.html</link>
<pubDate>05 Apr 2026 19:25:02 -0000</pubDate>
</item>
<item>
<title>NSA and IETF, part 6</title>
<description>The structure of the debate. #pqcrypto #hybrids #nsa #ietf #chart</description>
<link>http://blog.cr.yp.to/20260221-structure.html</link>
<pubDate>24 Mar 2026 02:54:35 -0000</pubDate>
</item>
<item>
<title>NSA and IETF, part 5</title>
<description>One battle after another. #pqcrypto #hybrids #nsa #ietf #lastcall</description>
<link>http://blog.cr.yp.to/20260219-obaa.html</link>
<pubDate>19 Feb 2026 13:34:02 -0000</pubDate>
</item>
<item>
<title>NSA and IETF, part 4</title>
<description>An example of censored dissent. #pqcrypto #hybrids #nsa #ietf #scope</description>
<link>http://blog.cr.yp.to/20251123-scope.html</link>
<pubDate>23 Nov 2025 18:14:15 -0000</pubDate>
</item>
<item>
<title>NSA and IETF, part 3</title>
<description>Dodging the issues at hand. #pqcrypto #hybrids #nsa #ietf #dodging</description>
<link>http://blog.cr.yp.to/20251123-dodging.html</link>
<pubDate>01 Dec 2025 17:36:05 -0000</pubDate>
</item>
<item>
<title>NSA and IETF, part 2</title>
<description>Corruption continues. #pqcrypto #hybrids #nsa #ietf #corruption</description>
<link>http://blog.cr.yp.to/20251123-corruption.html</link>
<pubDate>23 Nov 2025 17:43:20 -0000</pubDate>
</item>
<item>
<title>MODPOD</title>
<description>The collapse of IETF's protections for dissent. #ietf #objections #censorship #hybrids</description>
<link>http://blog.cr.yp.to/20251005-modpod.html</link>
<pubDate>07 Oct 2025 14:58:28 -0000</pubDate>
</item>
<item>
<title>NSA and IETF</title>
<description>Can an attacker simply purchase standardization of weakened cryptography? #pqcrypto #hybrids #nsa #ietf #antitrust</description>
<link>http://blog.cr.yp.to/20251004-weakened.html</link>
<pubDate>04 Oct 2025 21:32:21 -0000</pubDate>
</item>
<item>
<title>Surreptitious surveillance</title>
<description>On the importance of not being seen. #marketing #stealth #nsa</description>
<link>http://blog.cr.yp.to/20250930-stealth.html</link>
<pubDate>03 Oct 2025 09:53:30 -0000</pubDate>
</item>
<item>
<title>McEliece standardization</title>
<description>Looking at what's happening, and analyzing rationales. #nist #iso #deployment #performance #security</description>
<link>http://blog.cr.yp.to/20250423-mceliece.html</link>
<pubDate>17 Jul 2025 21:29:27 -0000</pubDate>
</item>
<item>
<title>As expensive as a plane flight</title>
<description>Looking at some claims that quantum computers won't work. #quantum #energy #variables #errors #rsa #secrecy</description>
<link>http://blog.cr.yp.to/20250118-flight.html</link>
<pubDate>18 Jan 2025 17:45:19 -0000</pubDate>
</item>
<item>
<title>The sins of the 90s</title>
<description>Questioning a puzzling claim about mass surveillance. #attackers #governments #corporations #surveillance #cryptowars</description>
<link>http://blog.cr.yp.to/20241028-surveillance.html</link>
<pubDate>02 Nov 2024 08:01:39 -0000</pubDate>
</item>
<item>
<title>Clang vs. Clang</title>
<description>You're making Clang angry. You wouldn't like Clang when it's angry. #compilers #optimization #bugs #timing #security #codescans</description>
<link>http://blog.cr.yp.to/20240803-clang.html</link>
<pubDate>03 Aug 2024 21:05:12 -0000</pubDate>
</item>
<item>
<title>Bibliography keys</title>
<description>It's as easy as [1], [2], [3]. #bibliographies #citations #bibtex #votemanipulation #paperwriting</description>
<link>http://blog.cr.yp.to/20240612-bibkeys.html</link>
<pubDate>06 Jul 2024 16:10:23 -0000</pubDate>
</item>
<item>
<title>Double encryption</title>
<description>Analyzing the NSA/GCHQ arguments against hybrids. #nsa #quantification #risks #complexity #costs</description>
<link>http://blog.cr.yp.to/20240102-hybrid.html</link>
<pubDate>11 Nov 2024 08:55:04 -0000</pubDate>
</item>
<item>
<title>Another way to botch the security analysis of Kyber-512</title>
<description>Responding to a recent blog post. #nist #uncertainty #errorbars #quantification</description>
<link>http://blog.cr.yp.to/20231125-kyber.html</link>
<pubDate>23 Dec 2023 15:06:14 -0000</pubDate>
</item>
<item>
<title>Reducing "gate" counts for Kyber-512</title>
<description>Two algorithm analyses, from first principles, contradicting NIST's calculation. #xor #popcount #gates #memory #clumping</description>
<link>http://blog.cr.yp.to/20231023-clumping.html</link>
<pubDate>23 Oct 2023 18:14:49 -0000</pubDate>
</item>
<item>
<title>The inability to count correctly</title>
<description>Debunking NIST's calculation of the Kyber-512 security level. #nist #addition #multiplication #ntru #kyber #fiasco</description>
<link>http://blog.cr.yp.to/20231003-countcorrectly.html</link>
<pubDate>30 Oct 2023 14:50:11 -0000</pubDate>
</item>
<item>
<title>Turbo Boost</title>
<description>How to perpetuate security problems. #overclocking #performancehype #power #timing #hertzbleed #riskmanagement #environment</description>
<link>http://blog.cr.yp.to/20230609-turboboost.html</link>
<pubDate>09 Jun 2023 11:23:03 -0000</pubDate>
</item>
<item>
<title>NSA, NIST, and post-quantum cryptography</title>
<description>Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia</description>
<link>http://blog.cr.yp.to/20220805-nsa.html</link>
<pubDate>08 Mar 2024 21:29:41 -0000</pubDate>
</item>
<item>
<title>Plagiarism as a patent amplifier</title>
<description>Understanding the delayed rollout of post-quantum cryptography. #pqcrypto #patents #ntru #lpr #ding #peikert #newhope</description>
<link>http://blog.cr.yp.to/20220129-plagiarism.html</link>
<pubDate>21 Jul 2024 13:24:35 -0000</pubDate>
</item>
<item>
<title>Optimizing for the wrong metric, part 1: Microsoft Word</title>
<description>Review of "An Efficiency Comparison of Document Preparation Systems Used in Academic Research and Development" by Knauff and Nejasmic. #latex #word #efficiency #metrics</description>
<link>http://blog.cr.yp.to/20201206-msword.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Why EdDSA held up better than ECDSA against Minerva</title>
<description>Cryptosystem designers successfully predicting, and protecting against, implementation failures. #ecdsa #eddsa #hnp #lwe #bleichenbacher #bkw</description>
<link>http://blog.cr.yp.to/20191024-eddsa.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>An introduction to vectorization</title>
<description>Understanding one of the most important changes in the high-speed-software ecosystem. #vectorization #sse #avx #avx512 #antivectors</description>
<link>http://blog.cr.yp.to/20190430-vectorize.html</link>
<pubDate>30 Apr 2019 14:45:32 -0000</pubDate>
</item>
<item>
<title>Reconstructing ROCA</title>
<description>A case study of how quickly an attack can be developed from a limited disclosure. #infineon #roca #rsa</description>
<link>http://blog.cr.yp.to/20171105-infineon.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Quantum algorithms to find collisions</title>
<description>Analysis of several algorithms for the collision problem, and for the related multi-target preimage problem. #collision #preimage #pqcrypto</description>
<link>http://blog.cr.yp.to/20171017-collisions.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Fast-key-erasure random-number generators</title>
<description>An effort to clean up several messes simultaneously. #rng #forwardsecrecy #urandom #cascade #hmac #rekeying #proofs</description>
<link>http://blog.cr.yp.to/20170723-random.html</link>
<pubDate>26 Jul 2017 11:49:44 -0000</pubDate>
</item>
<item>
<title>Benchmarking post-quantum cryptography</title>
<description>News regarding the SUPERCOP benchmarking system, and more recommendations to NIST. #benchmarking #supercop #nist #pqcrypto</description>
<link>http://blog.cr.yp.to/20170719-pqbench.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Some challenges in post-quantum standardization</title>
<description>My comments to NIST on the first draft of their call for submissions. #standardization #nist #pqcrypto</description>
<link>http://blog.cr.yp.to/20161030-pqnist.html</link>
<pubDate>30 Oct 2016 23:01:57 -0000</pubDate>
</item>
<item>
<title>The death of due process</title>
<description>A few notes on technology-fueled normalization of lynch mobs targeting both the accuser and the accused. #ethics #crime #punishment</description>
<link>http://blog.cr.yp.to/20160607-dueprocess.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Security fraud in Europe's "Quantum Manifesto"</title>
<description>How quantum cryptographers are stealing a quarter of a billion Euros from the European Commission. #qkd #quantumcrypto #quantummanifesto</description>
<link>http://blog.cr.yp.to/20160516-quantum.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Thomas Jefferson and Apple versus the FBI</title>
<description>Can the government censor how-to books? What if some of the readers are criminals? What if the books can be understood by a computer? An introduction to freedom of speech for software publishers. #censorship #firstamendment #instructions #software #encryption</description>
<link>http://blog.cr.yp.to/20160315-jefferson.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Break a dozen secret keys, get a million more for free</title>
<description>Batch attacks are often much more cost-effective than single-target attacks. #batching #economics #keysizes #aes #ecc #rsa #dh #logjam</description>
<link>http://blog.cr.yp.to/20151120-batchattacks.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>The death of optimizing compilers</title>
<description>Abstract of my tutorial at ETAPS 2015. #etaps #compilers #cpuevolution #hotspots #optimization #domainspecific #returnofthejedi</description>
<link>http://blog.cr.yp.to/20150314-optimizing.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Follow-You Printing</title>
<description>How Equitrac's marketing department misrepresents and interferes with your work. #equitrac #followyouprinting #dilbert #officespaceprinter</description>
<link>http://blog.cr.yp.to/20150218-printing.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>The Saber cluster</title>
<description>How we built a cluster capable of computing 3000000000000000000000 multiplications per year for just 50000 EUR. #nvidia #linux #howto</description>
<link>http://blog.cr.yp.to/20140602-saber.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Some small suggestions for the Intel instruction set</title>
<description>Low-cost changes to CPU architecture would make cryptography much safer and much faster. #constanttimecommitment #vmul53 #vcarry #pipelinedocumentation</description>
<link>http://blog.cr.yp.to/20140517-insns.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>NIST's cryptographic standardization process</title>
<description>The first step towards improvement is to admit previous failures. #standardization #nist #des #dsa #dualec #nsa</description>
<link>http://blog.cr.yp.to/20140411-nist.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>How to design an elliptic-curve signature system</title>
<description>There are many choices of elliptic-curve signature systems. The standard choice, ECDSA, is reasonable if you don't care about simplicity, speed, and security. #signatures #ecc #elgamal #schnorr #ecdsa #eddsa #ed25519</description>
<link>http://blog.cr.yp.to/20140323-ecdsa.html</link>
<pubDate>23 Oct 2023 09:54:08 -0000</pubDate>
</item>
<item>
<title>A subfield-logarithm attack against ideal lattices</title>
<description>Computational algebraic number theory tackles lattice-based cryptography.</description>
<link>http://blog.cr.yp.to/20140213-ideal.html</link>
<pubDate>09 Jan 2022 04:49:28 -0000</pubDate>
</item>
<item>
<title>Entropy Attacks!</title>
<description>The conventional wisdom says that hash outputs can't be controlled; the conventional wisdom is simply wrong.</description>
<link>http://blog.cr.yp.to/20140205-entropy.html</link>
<pubDate>17 Mar 2023 13:15:02 -0000</pubDate>
</item>
</channel>
</rss>
