The Serpent Cipher’s Key Schedule Transform is Injective.

This article is a continuation of the previous, and concludes the series. Let’s try this somewhat different variant of the program, which represents recurring bits of the expansion symbolically (and in a slightly more readable form) : ;; Register bitness. (defconstant +bitness+ 32)   (defun make-reg (reg-name bitness) "Make algebraic representation of a register (bits […]

Terms -8...8 of the Serpent Cipher's Key Schedule in Algebraic Form.

This article is a byproduct of the recent mega-puzzler concerning the Serpent cipher’s key expansion procedure. Behold: ;; Register bitness. (defconstant +bitness+ 32)   (defun make-reg (reg-name bitness) "Make algebraic representation of a register (bits in descending majority)" (loop for i from (1- bitness) downto 0 collect (make-symbol (format nil "~A~A" reg-name i))))   (defun […]

Linux. (1991 - 2018)

Linux. ( 1991 — 2018. ) No disrespect is intended for Stepan Mitrofanovich Gudimov (1913 – 1941), died heroically in aerial ramming maneuver… whose beautiful tomb I stole here. But IMHO a dead project of Linux’s stature deserves a tomb, even if only an imaginary and stolen one. Especially a stolen project…

UDP.

This is a simple library for Ada, to replace the asinine GNATSockets item. Supported: Unixlike OS back-end. Open/close datagram socket on given local IP and port. Transmit datagrams of fixed length. Receive (blocking) datagrams of fixed length, rejecting shorts, saving the originator’s IP/port. Handle all possible OS error conditions. Permanently unsupported: Microshit back-ends. TCP. IPv6. […]

“Finite Field Arithmetic.” Chapter 11: Tuning and Unified API.

This article is part of a series of hands-on tutorials introducing FFA, or the Finite Field Arithmetic library. FFA differs from the typical “Open Sores” abomination, in that — rather than trusting the author blindly with their lives — prospective users are expected to read and fully understand every single line. In exactly the same […]

The Google H1 Fritz Chip.

Edit (January 2023): This machine is long out of print, but NSA lackeys continue to spread “squid ink” regarding the supposed harmlessness of its Fritz chip. So, for the thick: Yes, it’s a backdoor. The CR50 bypasses any user-installed OS, and can extract arbitrary secrets from disk and memory (or silently implant “incriminating” info) via […]

A Clean Gentoo for 'Rockchip'.

This recipe will re-create the hygienic gentoo installed on the RK pilot plant at Pizarro. The resulting install will also contain the full set of distfiles used in the rebuilding of the ‘world’, in /usr/portage/distfiles. No promises are made of fitness for a particular use, or of provenance, OTHER THAN as described above. ——— Materials […]

“Finite Field Arithmetic.” Chapter 10: Introducing Karatsuba's Multiplication.

This article is part of a series of hands-on tutorials introducing FFA, or the Finite Field Arithmetic library. FFA differs from the typical “Open Sores” abomination, in that — rather than trusting the author blindly with their lives — prospective users are expected to read and fully understand every single line. In exactly the same […]

Dicţionar Român-Englez.

This post exists to give a permanent home and linkable reference point for certain materials. Specifically, a — to my knowledge, currently the only one found anywhere on the entire Net — grep-able plain-text English-Romanian dictionary. The original source was an ancient piece of MS-Windows nagware. The perpetrator of this item (I hesitate to dignify […]

“Finite Field Arithmetic.” Chapter 9: "Exodus from Egypt" with Comba's Algorithm.

This article is part of a series of hands-on tutorials introducing FFA, or the Finite Field Arithmetic library. FFA differs from the typical “Open Sores” abomination, in that — rather than trusting the author blindly with their lives — prospective users are expected to read and fully understand every single line. In exactly the same […]