pseudorandom/feed.xml

39 lines
1.9 KiB
XML

<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
<title>pseudorandom</title>
<link href="https://pseudorandom.resistant.tech"/>
<link rel="self" href="https://pseudorandom.resistant.tech/feed.xml" />
<updated>2021-08-10T14:30:00Z</updated>
<author>
<name>Sarah Jamie Lewis</name>
</author>
<id>urn:uuid:699b0ba2-2fbf-4f9d-b5ac-4a7e044be3c6</id>
<entry>
<id>3258032e-ec03-4847-9c54-30464284bb52</id>
<title>Revisiting First Impressions: Apple, Parameters and Fuzzy Threshold PSI</title>
<link href="https://pseudorandom.resistant.tech/ftpsi-parameters.html"/>
<updated>2021-08-16T11:05:00Z</updated>
<summary>Last week, Apple published more additional information regarding the parameterization of their new Fuzzy Threshold
PSI system in the form of a Security Threat Model...</summary>
</entry>
<entry>
<id>urn:uuid:a7b71725-1cb6-4d8f-8e19-e92580d5b316</id>
<title>A Closer Look At Fuzzy Threshold PSI</title>
<link href="https://pseudorandom.resistant.tech/a_closer_look_at_fuzzy_threshold_psi.html"/>
<updated>2021-08-12T14:30:00Z</updated>
<summary>Apple recently released a detailed cryptographic paper describing a new private
set intersection protocol which they named Fuzzy Threshold PSI with Associated Data, or ftPSI-AS for short....</summary>
</entry>
<entry>
<id>urn:uuid:fc37f259-004e-406b-addb-85cda6107e7b</id>
<title>Obfuscated Apples</title>
<link href="https://pseudorandom.resistant.tech/obfuscated_apples.html"/>
<updated>2021-08-10T14:30:00Z</updated>
<summary>Generating noise in a way which is indistinguishable from real signal is a ridiculously hard problem. Obfuscation does not hide signal, it only adds noise....</summary>
</entry>
</feed>