Samuel Dobson (@meshcollider) 's Twitter Profile
Samuel Dobson

@meshcollider

PhD (mathematics) from @AucklandUni

ID: 2819198815

calendar_today19-09-2014 04:13:53

447 Tweet

5,5K Followers

225 Following

Samuel Dobson (@meshcollider) 's Twitter Profile Photo

PhD Thesis submitted✅🎉 Has been a great journey, thank you Steven Galbraith for your excellent supervision! Now the wait for the examiners' reports begins 😎

PhD Thesis submitted✅🎉 

Has been a great journey, thank you <a href="/EllipticKiwi/">Steven Galbraith</a> for your excellent supervision!

Now the wait for the examiners' reports begins 😎
belcher (@chris_belcher_) 's Twitter Profile Photo

An alpha version of my coinswap project is released! lists.linuxfoundation.org/pipermail/bitc… Doesnt have all the features yet, but works on regtest, signet and mainnet Imagine a new privacy tech for bitcoin, like coinjoin, but cant be blocked b/c the txes look exactly the same as regular txes

yan (@bcrypt) 's Twitter Profile Photo

when reading text in a non-native language & wondering how it's pronounced, u can enter this in devtools to have the browser pronounce it: u=new SpeechSynthesisUtterance(getSelection().toString());u.lang='ru-RU';speechSynthesis.speak(u) (replace 'ru-RU' with any BCP 47 tag)

Christopher Allen (@christophera) 's Twitter Profile Photo

This paper got less attention than I thought it would. Among its claims is that BIP32 (used extensively by Bitcoin but also many other blockchains) offers 91 bits of security. I always assumed some low n?<128, but not so low. Given BIP32 is a decade old it was overdue for review.

Steven Galbraith (@elliptickiwi) 's Twitter Profile Photo

Congratulations to Samuel Dobson , who successfully defended his PhD thesis "Key Exchange and Zero-Knowledge Proofs from Isogenies and Hyperelliptic Curves" this morning.

Giacomo 🪿 (@isogenies) 's Twitter Profile Photo

It works!! Here's a SageMath implementation of the SIDH Key Recovery attack of Castryck and Decru. Huge thanks to R. Their insights allowed us to directly compute the image of points in the Jacobian through divisors. No Gröbner needed! github.com/jack4818/Castr…

Damien Robert (@gondoploum) 's Twitter Profile Photo

I just posted an updated and clarified version of my previous paper (which was too hastily written...) on breaking SIDH: eprint.iacr.org/2022/1038.pdf

Tako Boris Fouotsa 🇨🇲 (@fouotsab) 's Twitter Profile Photo

In this preprint, in order to counter the Castryck-Decru attack (and derivatives), we suggest to use a fixed degree, but then mask only the torsion point information. How do we do that and why is this worth exploring? A thread! 1/n

Tancrède Lepoint (@leptan) 's Twitter Profile Photo

Next version of Bouncy Castle will also include CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon, and other algorithms! It is available as beta right now at downloads.bouncycastle.org/betas/ 🎉. A great way to experiment (with care!) with the schemes being standardized by NIST.

Next version of Bouncy Castle will also include CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon, and other algorithms! It is available as beta right now at downloads.bouncycastle.org/betas/ 🎉. A great way to experiment (with care!) with the schemes being standardized by NIST.
David A. Harding (@hrdng) 's Twitter Profile Photo

If you generated a wallet using Libbitcoin's Bitcoin Explorer, including as described in the appendix to Mastering Bitcoin, your funds are at risk (or already stolen). Full details: milksad.info