Alexandre Adomnicăi
aadomn.bsky.social
Alexandre Adomnicăi
@aadomn.bsky.social
Reposted by Alexandre Adomnicăi
Wow, QUIC Retry Packets use AES-GCM with a fixed key/nonce, empty plaintext, and associated data prefixed with a secret as a sort of MAC. That's... terrifying?

They essentially do MAC(K, v) = AES-GCM(key=const, nonce=const, plaintext=empty, aad=K||v). Does that actually hold?
RFC 9001: Using TLS to Secure QUIC
This document describes how Transport Layer Security (TLS) is used to secure QUIC.
quicwg.org
November 24, 2025 at 10:51 AM
Reposted by Alexandre Adomnicăi
Cryptographers Held an Election. They Can’t Decrypt the Results.
www.nytimes.com
November 22, 2025 at 2:07 AM
Reposted by Alexandre Adomnicăi
I had a bug in my new ML-DSA implementation that caused Verify to reject all signatures. I gave up after half an hour. On a whim, I threw Claude Code at it. Surprisingly (to me!) it one-shotted it in 5 minutes.

A small case study of useful AI tasks that aren't generating code that requires review.
Claude Code Can Debug Low-level Cryptography
Surprisingly (to me) Claude Code debugged my new ML-DSA implementation faster than I would have, finding the non-obvious low-level issue that was making Verify fail.
words.filippo.io
November 1, 2025 at 6:26 PM
Reposted by Alexandre Adomnicăi
What is Cryptography Hiding from Itself? (Diego F. Aranha, Nikolas Melissaris) ia.cr/2025/1951
October 20, 2025 at 1:09 AM
Reposted by Alexandre Adomnicăi
Why factoring (of numbers that aren’t 15) isn’t a good benchmark for tracking the progress of quantum computers.

algassert.com/post/2500
Why haven't quantum computers factored 21 yet?
Craig Gidney's computer science blog
algassert.com
August 31, 2025 at 3:40 PM
Reposted by Alexandre Adomnicăi
Cryptographic Treatment of Key Control Security – In Light of NIST SP 800-108 (Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro) ia.cr/2025/1123
June 16, 2025 at 9:21 PM
Reposted by Alexandre Adomnicăi
We're rewriting parts of Microsoft's SymCrypt cryptographic library in Rust to improve memory safety and defend against side-channel attacks, enabling formal verification while maintaining backward compatibility via a Rust-to-C compiler: msft.it/6011SU7Fc
June 10, 2025 at 4:31 PM
Reposted by Alexandre Adomnicăi
Oh wow, this is really great work. Recent results on PCGs allowed much more efficient MPC preprocessing (among other things) using somewhat new assumptions. Apparently, these assumptions are too strong.

Congratulations to the authors on their IACR grant slam of breaks :)
Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding (Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, Damien Vergnaud) ia.cr/2025/892
May 20, 2025 at 4:02 AM
Awesome to see my Cortex-M4/7 Keccak implementations further improved by SLOTHY, a very promising optimization tool!
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY (Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim) ia.cr/2025/366
March 5, 2025 at 6:49 AM
Reposted by Alexandre Adomnicăi
Confidential computing is a pretty cool paradigm; in theory, you don’t need to trust your cloud provider to not steal or tamper with your data anymore, you *just* have to trust the hardware. In practice, don’t forget about defense in depth & co 😉
AMD: Microcode Signature Verification Vulnerability
### Summary Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...
github.com
February 4, 2025 at 7:03 AM
Reposted by Alexandre Adomnicăi
How to Prove False Statements: Practical Attacks on Fiat-Shamir (Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov) ia.cr/2025/118
January 27, 2025 at 1:59 AM
Reposted by Alexandre Adomnicăi
Very excited to share our first exploration of threshold MAYO (yes, the PQC algorithm)! 🎉 Joint work with the amazing
Daniel Escudero and Guilhem Niot. The ideas can extend to UOV as well—let’s have MV-based threshold cryptography!

📄 eprint.iacr.org/2024/1960.pdf
December 6, 2024 at 4:34 PM
Reposted by Alexandre Adomnicăi
"Hack Now, Decrypt Later is Overhyped - Here's Why", by Duncan Jones
Hack Now, Decrypt Later is Overhyped – Here’s Why
Your needle may be interesting, but the haystack is large
chasingcyber.com
December 2, 2024 at 8:05 AM