Hovav Shacham

1.8K posts

Hovav Shacham banner
Hovav Shacham

Hovav Shacham

@hovav

Looney Marxist UT professor poisoning the minds of young students about security, privacy, and tech policy.

Katılım Kasım 2008
0 Takip Edilen627 Takipçiler
Hovav Shacham
Hovav Shacham@hovav·
Dear RISC-V folks: By all means, please do standardize¹ 96 encodings for 2-byte instructions that mean “pop registers (including ra), add to sp, and return.” They will come in very handy. __ ¹ github.com/riscv/riscv-co…
Hovav Shacham tweet media
English
0
4
12
0
I M Doge Mocenigo
I M Doge Mocenigo@DogeMocenigo·
This diagram appears in a peer-reviewed and accepted paper in an IEEE publication. Compression AFTER encryption, therefore entropy is already maximal or near maximal. Well done, reviewers!!!!
I M Doge Mocenigo tweet media
English
4
14
79
0
Hovav Shacham
Hovav Shacham@hovav·
It is neither “hypothetical” nor “imaginary” that HB 20 was specifically written to platform Holocaust denial. It’s in the legislative record!¹ __ ¹ #page=48" target="_blank" rel="nofollow noopener">journals.house.texas.gov/hjrnl/872/pdf/…
Hovav Shacham tweet media
English
1
1
3
0
Hovav Shacham
Hovav Shacham@hovav·
Um, anyone hiring in security in Berkeley or SF?
English
1
0
2
0
Hovav Shacham
Hovav Shacham@hovav·
Julia Morgan’s Charles A. & Carrie P.W. Kofoid House (1905) is for sale! 2616etna.com
English
1
0
1
0
Matthew Green
Matthew Green@matthew_d_green·
@LeaKissner I think a lot of people outside of Twitter are also rooting for you.
English
3
0
25
0
Lea Kissner
Lea Kissner@LeaKissner·
This is a Redbird appreciation tweet. I had a pretty busy week last week and my coworkers decided to cheer me up and keep me cozy. Y'all are awesome and I appreciate you. (Redbird is the part of Twitter I'm in. We have a lot of bird names.)
Lea Kissner tweet media
English
12
2
278
0
Hovav Shacham
Hovav Shacham@hovav·
@veorq Heck, this attack was discussed in the BGLS'03 paper introducing aggregate signatures! And it had a long history by then in the context of multisignatures ...
Hovav Shacham tweet media
English
0
0
4
0
Eric Rescorla
Eric Rescorla@ekr____·
Most people will never have to implement PIR (or any cryptography). But having the right intuition for how things work is very useful, and that depends on being able to see how things work end-to-end.
English
1
0
7
0
Eric Rescorla
Eric Rescorla@ekr____·
PIR is really a remarkably counterintuitive result. A client can retrieve information from a server without the server learning which piece of information it read. It's not obvious that this should be possible but it is. Learn how at: educatedguesswork.org/posts/
English
3
16
54
0
Hovav Shacham retweetledi
Evelyn Douek
Evelyn Douek@evelyndouek·
finally read the 3rd-party audit released by the Twitter whistleblower & it's not so much whistleblowing as... a list of known issues? still, wld be great if every platform had to do one & release the findings! that's one of my suggestions in here: papers.ssrn.com/sol3/papers.cf…
English
1
5
21
0
Brian Smith
Brian Smith@BRIAN_____·
@hovav @agl__ What would be an example of one that’s not constant-time? Thanks in advance!
English
1
0
0
0
Adam Langley
Adam Langley@agl__·
It appears that Intel doesn't guarantee constant-time execution of _any_ instructions on Ice Lake or later unless a configuration bit is set: intel.com/content/www/us…
English
1
47
99
0