Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile
Prof B Buchanan OBE FRSE

@billatnapier

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.

ID: 226900035

linkhttp://asecuritysite.com calendar_today15-12-2010 11:05:15

66,66K Tweet

12,12K Takipçi

5,5K Takip Edilen

Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

Dream of Web 3.0 is alive and kicking. Never thought I could run pairing-based cryptography & BBS+ signatures on my iPhone, & without any server call backs. Four decades of privacy-aware cryptography have all been leading up to WASM. BBS+ sig: asecuritysite.com/webcrypto/cryp…

Sapphire (@sapphiredotnet) 's Twitter Profile Photo

Why should NISC 2025 be in your diary? 📒 The National Information Security Conference (NISC) isn’t just another cyber security event. It’s where the industry connects, learns, and looks ahead to the future. You can earn CPD points, connect with peers and industry leaders, and

Why should NISC 2025 be in your diary?  📒

The National Information Security Conference (NISC) isn’t just another cyber security event. It’s where the industry connects, learns, and looks ahead to the future.

You can earn CPD points, connect with peers and industry leaders, and
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

Innovation is all about seeing into the future and understanding what's on the horizon. Our final Trust4Futures workshop is on 4 June 2025 at 10am (CET), and will cover areas such as Homomorphic Enc, ZKPs, Quantum Comp, Privacy-aware AI. See the future: trust4futures.com

Innovation is all about seeing into the future and understanding what's on the horizon. Our final Trust4Futures workshop is on 4 June 2025 at  10am (CET), and will cover areas such as Homomorphic  Enc, ZKPs, Quantum Comp, Privacy-aware AI. See the future: trust4futures.com
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

libsodium.js is a sodium crypto library that is compiled to WASM (WebAssembly). libsodium does not support the normal hashes of SHA-256 and SHA-3, but usese the superfast Blake2b as its default hashing method: asecuritysite.com/webcrypto/cryp…

libsodium.js is a sodium crypto library that is compiled to WASM (WebAssembly).  libsodium does not support the normal hashes of SHA-256 and SHA-3, but usese the superfast Blake2b as its default hashing method: asecuritysite.com/webcrypto/cryp…
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

To me, WebAssembly (WASM) is one of the greatest enhancements the software world has ever seen. It's secure, privacy-enabled, sandboxed, fast, compact and compatible, and opens up a whole new world of applications. Samples for cryptography: asecuritysite.com/wasm

To me, WebAssembly (WASM) is one of the greatest enhancements the software world has ever seen. It's secure, privacy-enabled, sandboxed, fast, compact and compatible, and opens up a whole new world of applications. Samples for cryptography: asecuritysite.com/wasm
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

If you have not already done so, go and learn Rust, it's now integrated in the Web (with WASM) and where you can build amazing Web applications using a wide range of currently available Rust crates. asecuritysite.com/rust

Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

SipHash and WASM. Two of the best cybersecurity researchers around are: JP Aumasson and Daniel J Bernstein (djb). Here is SipHash and WASM: billatnapier.medium.com/siphash-and-wa…

SipHash and WASM. Two of the best cybersecurity researchers around are: <a href="/veorq/">JP Aumasson</a> and Daniel J Bernstein (djb). Here is SipHash and WASM: billatnapier.medium.com/siphash-and-wa…
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

It's not just about cryptographic hashes; hashing methods are also used in things like hash tables and Bloom filters, and which require fast hashing. Here's SipHash implemented in WASM: asecuritysite.com/webcrypto/cryp…

It's not just about cryptographic hashes; hashing methods are also used  in things like hash tables and Bloom filters, and which require fast  hashing. Here's SipHash implemented in WASM:  asecuritysite.com/webcrypto/cryp…
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

Difference between Box & Seal encryption? With Seal, Bob encrypts a message with randomly generated symmetric key. He then encrypts symmetric key with Alice's public key. Box adds signing for Bob. Seal with WASM: asecuritysite.com/webcrypto/cryp… Box with WASM: asecuritysite.com/webcrypto/cryp…

Difference between Box &amp; Seal encryption? With Seal, Bob encrypts a message with randomly generated symmetric key. He then encrypts symmetric key with Alice's public key.  Box adds signing for Bob.

Seal with WASM: asecuritysite.com/webcrypto/cryp…

Box with WASM: asecuritysite.com/webcrypto/cryp…
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

If you are into cybersecurity, do you know the difference between deterministic and non-deterministic key generation? Find out the difference here: billatnapier.medium.com/deterministic-…

If you are into cybersecurity, do you know the difference between deterministic and non-deterministic key generation?  Find out the difference here:  billatnapier.medium.com/deterministic-…
Prof B Buchanan OBE FRSE (@billatnapier) 's Twitter Profile Photo

AEGIS or AES? AES has been around since 2001, and it is still going strong. But, there are alternatives, including with ChaCha20 and AEGIS. And, it was Bart Preneel who co-authored a paper on AEGIS [1]. Read more: billatnapier.medium.com/aegis-or-aes-4…

AEGIS or AES? AES has been around since 2001, and it is still going strong. But, there are alternatives, including with ChaCha20 and AEGIS. And, it was Bart Preneel who co-authored a paper on AEGIS [1]. Read more: billatnapier.medium.com/aegis-or-aes-4…