Look for any podcast host, guest or anyone
Showing episodes and shows of

Jean-Philippe Aumasson

Shows

NoLimitSecuNoLimitSecuLa Cryptographie déchiffrée - Une introduction pratique au chiffrement moderneEpisode #485 consacré au livre de Jean-Philippe Aumasson La Cryptographie déchiffrée Une introduction pratique au chiffrement moderne The post La Cryptographie déchiffrée appeared first on NoLimitSecu.2024-12-2233 minCrypto Miner Bros PodcastCrypto Miner Bros PodcastWhat is Blake2b Algorithm & Top Blake2b Coins to Mine Blake2b is a cryptographic hash function based on the Blake algorithm. To be precise, Blake2b is a modified version of Blake. Designed by Jean-Philippe Aumasson, Luca Henzen, Willi Meier, and Raphael C.-W. Phan, Blake2 was considered a potential alternative to MD5 and the SHA series algorithms as it aims to provide enhanced security and improved efficiency. Blake2b depends on the algorithm borrowed from the ChaCha stream cipher, which was designed by Daniel J. Bernstein. Let’s explore the Blake2b algorithm more, its characteristics, and the top Blake2b mineable coins in deta...2024-05-1408 minASecuritySite PodcastASecuritySite PodcastWorld-leaders in Cryptography: Jean-Philippe (JP) AumassonJean-Philippe (JP) Aumasson is a true innovator in cryptography, and especially in the creation of fast, secure and light-weight hashing methods. He co-designed the BLAKE hashing method [here], and which is currently the fastest secure cryptographic hashing function. Along with this, he worked with Daniel J Bernstein on SipHash [here], and created the Cryptography Coding Standard. JP also created the Quark light-weight hashing method, and is also the author of "Serious Cryptography: A Practical Introduction to Modern Encryption" [here].2023-07-111h 00The Ledger PodcastThe Ledger Podcast#63 Should Crypto Fear Quantum Computing?This year has seen the emergence of a variety of AI products showing us a glimpse of the exponential age. But one other innovation has the potential to completely change our world - Quantum computing. Quantum computers are very different from the classical computers that have been around for more than half a century. They harness the power of quantum mechanics to sift through huge numbers of possibilities and extract solutions to problems that might have otherwise been impossible to solve.But then, if quantum computing can break crypto-encryption, what will happen to blockchain technology? Is there a chance...2023-02-1345 minApplied Blockchain PodcastApplied Blockchain Podcast#01 - John Woods from the Algorand Foundation: The Future of AlgorandWelcome to the first episode of the Applied Blockchain Podcast, hosted by Adi Ben-Ari. In this episode, Adi is joined by John Woods, Chief Technology Officer at the Algorand Foundation. They discussed how John got started in the industry, why Algorand is particularly interesting, details on the AlgoKit beta launch (available now) and much more. This podcast is brought to you by Applied Blockchain, a Blockchain development company that is shaping the future of Blockchain and Web3.  ---------- Resources:  AlgoKit beta Book: Serious Cryptography by Jean-Philippe Aumasson This Podcast is...2023-01-2640 minThe Swiss Road To CryptoThe Swiss Road To CryptoMeet the cryptographer that Linux, Google and Ethereum trust, JP AumassonJean-Philippe Aumasson is a cryptographer. He developed a hashing algorithm called Blake. It is trusted by Linux, Google and Ethereum. We will discuss Blake, what cryptography is, and what a cryptographer actually does. We also discuss MPC,NFT and moreTime stamps00:43 Backround03:06 Working at Kudelski 05:07 Cryptography math and mountaineering06:59 Cryptography and hacking 08:36 Cryptography and programing 10:31 Cryptography, audits and assements 12:15 MPC multiparty computation 15:35 Can MPC eliminate the need for people to manage their private keys? 16:36 NFT's19:37 Blake 3, speed, security Google and Ethereum23:24 Blake and Asics24:50 The question...2022-05-0637 minNewsletter with AudioNewsletter with AudioMeet the cryptographer that Linux, Google and Ethereum trust, JP AumassonJean-Philippe Aumasson is a cryptographer. He developed a hashing algorithm called Blake. It is trusted by Linux, Google and Ethereum. We will discuss Blake, what cryptography is, and what a cryptographer actually does. We also discuss MPC,NFT and moreTime stamps00:43 Backround03:06 Working at Kudelski 05:07 Cryptography math and mountaineering06:59 Cryptography and hacking 08:36 Cryptography and programing 10:31 Cryptography, audits and assements 12:15 MPC multiparty computation 15:35 Can MPC eliminate the need for people to manage their private keys? 16:36 NFT's19:37 Bl...2022-05-0637 minJob Tales - I interview professionals to help you become who you wish to beJob Tales - I interview professionals to help you become who you wish to be#34 The Profession of a Cryptographer - Jean Philippe Aumasson10 years ago you would not encounter many cryptographers, and it was surely not a buzzword.Today cryptography, block-chain, cryptocurrency, secret coding are professions, and very interesting ones indeed.Jean Philippe Aumasson is based in Switzerland and has a great background in this field.His last startup is called Taurus: https://taurushq.com/.Here you can find his publications and bio: https://aumasson.jp/.Today there are many applications of cryptography, such as zero knowledge proofs, multi-party computation, secret sharing.Listen to this episode to learn more if...2021-12-2325 minCryptography FMCryptography FMEpisode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin. While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds. But wait, what exactly is a parallelizable hash function? Isn't a lower round number risky? And heck, ho...2020-10-1345 minIntego Mac PodcastIntego Mac PodcastWe Can’t Be Safe without a Faraday CageIntego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple's policies. And spies can eavesdrop by watching the variations in light bulbs. Show Notes: Serious Cryptography - A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson Applied Cryptography: Protocols, Algorithms and Source Code in C by Bruce Schneier Cryptography: A Very Short Introduction, by Fred Piper and Sean Murphy ROT13 Zoom does 180 on encryption plans, will bring it to all users including free accounts in July Improving Our...2020-06-1932 minSOVRYNSOVRYNSovryn Tech Ep. 0249: “Assume Malevolence"Patreon vs. the creators? The Amazon Key? Plus, a review of the ASUS Zenbook 3, more Facebook horseshit, and much, much more! Special Guests: N/A Opening Audio: N/A The Foreplay: --The Sovryn Tech Newsletter (zog.email), “Serious Cryptography” by Jean-Philippe Aumasson (bit.ly/2xxduJ4), Facebook is algorithmically choosing what notifications you see, IoT Reaper, Google now basing searches on location data, VPN concerns (bit.ly/2yWQ8yl). Story of the Week:--“Patreon vs. Porn” Link: www.openlettertopatreon.com/, bit.ly/2zO2Bn3 HackSec:--“Amazon Key...2019-03-0600 minSegurança LegalSegurança LegalEpisódio #147 – Quebrando SenhasNeste episódio vamos falar sobre a segurança de senhas frente ao poder computacional cada vez mais barato da nuvem. Resumo de notícias em 20:55. Assunto principal em 40:52. Ajude o Segurança Legal a continuar existindo. Visite nossa campanha de financiamento coletivo e nos apoie! ShowNotes Resumo de Notícias com Fábio Assolini Empresa acessava dados de usuários do Facebook para uso eleitoral (Via The Guardian) Ministério Público investiga venda de dados de clientes por farmácias (via G1) Google bloqueou 10 milhões de virus para Android...2018-03-231h 34DEF CON 23 [Audio] Speeches from the Hacker ConventionDEF CON 23 [Audio] Speeches from the Hacker ConventionJean-Philippe Aumasson - Quantum Computers vs. Computers SecurityMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf Quantum Computers vs. Computers Security Jean-Philippe Aumasson Principal Cryptographer, Kudelski Security, Switzerland We've heard about hypothetical quantum computers breaking most of the public-key crypto in use—RSA, elliptic curves, etc.—and we've heard about "post-quantum" systems that resist quantum computers. We also heard about quantum computers' potential to solve other problems considerably faster than classical computers, such as discrete optimization, machine learning, or code verification problems. And we heard about a commercial quantum computer, and we heard vendors of quan...2015-10-2200 min