Alex Pruden (@apruden08) 's Twitter Profile
Alex Pruden

@apruden08

CEO Project11 @qdayclock, Chairman @aleoHQ, Contributor @zeroknowledgefm, Founder @z_prize; Former @a16zcrypto, @coinbase, @standfordGSB, and green hat @USArmy

ID: 3430235213

calendar_today18-08-2015 17:50:37

2,2K Tweet

7,7K Takipçi

554 Takip Edilen

Desmond (@desfrontiertech) 's Twitter Profile Photo

Looking back, this was probably the most important slide from Analyst Day. For years CRQCs were a 2030 problem. Academic talk more than operational risk. Now the Department of War is saying encryption could be toast in just three years. That shifts it from lab demo to war budget

Looking back, this was probably the most important slide from Analyst Day. For years CRQCs were a 2030 problem. Academic talk more than operational risk. Now the Department of War is saying encryption could be toast in just three years. That shifts it from lab demo to war budget
Conor Deegan (@conordeegan4) 's Twitter Profile Photo

We built a site: howbigistoobig.com It shows, very literally, what post-quantum secure looks like. Keys, signatures, CPU cycles all get much bigger. Some systems care about bandwidth, others storage, others signing or verification speed. In the classical world, one

zooko🛡🦓🦓🦓 ⓩ (@zooko) 's Twitter Profile Photo

We’ve devised a new cryptographic algorithm to make it faster and cheaper to protect users from the threat of quantum computers.

Conor Deegan (@conordeegan4) 's Twitter Profile Photo

Introducing ML-DSA-B, a variant of ML-DSA powered by BLAKE3 instead of SHAKE. Making use of BLAKE3's tree parallelism and SIMD-friendly design we see a speedup of up to 20% for signing, 30% for verification, and 60x for pre-hashing in initial benchmarks. From myself,

Introducing ML-DSA-B, a variant of ML-DSA powered by BLAKE3 instead of SHAKE.

Making use of BLAKE3's tree parallelism and SIMD-friendly design we see a speedup of up to 20% for signing, 30% for verification, and 60x for pre-hashing in initial benchmarks.

From myself,
Google Quantum AI (@googlequantumai) 's Twitter Profile Photo

Our latest research introduces "color codes" requiring fewer qubits and allows for faster logical operations compared to surface codes. Learn more → goo.gle/3JGcnRq

Ian Miers (@secparam) 's Twitter Profile Photo

Discord user IDs getting leaked is the entirely predictable consequence of requiring platforms to do age verification. That data never goes away, it spreads. In this case, into appeals in a breached customer support. And predictably, it can get worse. 404media.co/the-discord-ha…"

Alex Pruden (@apruden08) 's Twitter Profile Photo

Crypto has to migrate to post-quantum digital signatures to truly future-proof. But those signatures come with a trade-off: they're large and slow. That's why I'm proud to announce this collaboration with colleagues @conordeegan, zooko🛡🦓🦓🦓 ⓩ, and JP Aumasson to release ML-DSA-B, an

Ian Miers (@secparam) 's Twitter Profile Photo

Problem is once users have digital IDs, demands will shift. Instead of 'are you 18?', it becomes: prove you're human, prove you're not banned, prove you live here. Then you need programmable identity. Private IDs are just a start, as we looked at here. eprint.iacr.org/2022/878

Alex Pruden (@apruden08) 's Twitter Profile Photo

The prevalence of pure socialist/communist political philosophy in academia is completely unsurprising, given that those systems tend to be the best *in theory* but the worst *in practice*

Project 11 (@qdayclock) 's Twitter Profile Photo

Surprises while verifying post-quantum signatures on a MacBook by David Nugent Migrating to post-quantum cryptography impacts performance differently depending on hardware, firmware, software, and use case. In this post, we migrate a Rust system from the quantum-vulnerable EdDSA

Alex Pruden (@apruden08) 's Twitter Profile Photo

This is why you need to build in crypto-agility to truly future-proof digital assets. As Martin Shkreli puts here, every code base is ultimately breakable on a long enough time scale (and who's to say there isn't an as-yet-undiscovered attack on classical ECC)?

Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

The “age verification” and the “human identification” problem are the same problem. It upsets me to be around people who think they’re working on the first, but don’t understand they’re actually working on the second.

Project 11 (@qdayclock) 's Twitter Profile Photo

We’re excited to announce that Michael Gronager (Michael Gronager), Founder and former CEO of Chainalysis, is joining Project Eleven as an advisor. A pioneer in blockchain analytics and infrastructure, Michael has been at the forefront of building trust and transparency in the digital