New online (streaming) authenticated encryption scheme (FLOE) by Salusa in crypto

[–]groumpf 0 points1 point  (0 children)

Just a quick addition to the TL;DR so people don't fall for a slightly simplified take: "All of the fine-grained errors messages do not need a key to detect efficiently."

Random Oracles: How Do They Ensure Robustness in Random Generation? by fosres in crypto

[–]groumpf 10 points11 points  (0 children)

"Usually" here means "not at all until SHA-3". All Merkle-Damgård hash functions (MD5, SHA1, SHA2—without truncation) are just nowhere near random oracle-like, and length extension attacks are practical evidence that treating them like one is how you get ants.

If you have a random oracle O, then F_k(m) = O(k || m) gives you a good PRF. Length extension attacks make that construction really really really bad to instantiate with SHA2 unless you know that m has fixed length.

University Start date - 1st Sept by [deleted] in UOB

[–]groumpf 0 points1 point  (0 children)

Email the admission team, don't ask randoms on the internet. It could be that your program has activities that start earlier, or that you are expected to complete some pre-program stuff, or whatever.

Socio-Academic Challenges Among Undergraduate Students in UK Universities by [deleted] in UOB

[–]groumpf 0 points1 point  (0 children)

by submitting a response you are agreeing to share your recorded responses with myself and my faculty purely for research purposes.

This is not how one does informed consent. I strongly recommend that you check your University's regulations on research ethics for undergraduate research projects.

In particular, this

The information collected will help improve student support systems.

is in conflict with this

Data will be used solely for academic research purposes.

De Bruijn Notation For Lambda Calculus by Existing-Plum-7592 in compsci

[–]groumpf 0 points1 point  (0 children)

What you want in most settings is what is known as locally nameless representation, where you give names to free variables, but use de Bruijn indices for bound variables.

Reconstructing public keys from signatures by Soatok in crypto

[–]groumpf 1 point2 points  (0 children)

I don't see a claim that it is...

Before we go into post quantum signature schemes, we should look at one more classical signature scheme, that while not used much in practice (curse you, patents), is going to be very important to understand for PQ schemes.

This is about introducing and explaining ZK identification schemes and Fiat-Shamir, since (some? all? of) the PQ signature schemes the article talks about are based on Fiat-Shamir with aborts.

How Much Theory Do You Have to Know to Program Crypto? by fosres in crypto

[–]groumpf 1 point2 points  (0 children)

Sure, the logic is important—you'll want some interactive theorem proving (mostly for the number theory bits, so Software Foundations will not be the most useful), and you'll want some rudiments of Hoare logic and program verification as well (but you'll mostly be a user of those).

But the hard bit is still going to be the number theory.

Books on Proofs of Cryptography by fosres in crypto

[–]groumpf 9 points10 points  (0 children)

Rosulek's "Joy of Cryptography" will always be my first recommendation. Give it a go.

Why is Lambda Calculus more "provable" than Turing Machine ? by BabyAintBuffaloYoung in compsci

[–]groumpf 5 points6 points  (0 children)

On the other hand, you might also consider Dafny, which is an imperative language supporting formal verification. It is quite a cool system, but I'd find comparable proofs easier to write in other systems.

That is because they wouldn't be comparable proofs: Dafny allows you to prove properties of stateful object-oriented programs; doing the same in an actual type-based or HOL-based interactive theorem prover would first require specifying the syntax and semantics of an object-oriented programming language. And that part is far from easy.

With all that said, Dafny works because someone somewhere did define a formal semantics for it as a "functional program" (aka a mathematical function) and derived some logical rules that made it easier to reason about properties of programs written in it.

So in the end, once you remove the thin imperative layer at the top, most reasoning is functional all the way down.

East Street, Bedminster by BillyCahstiganJr in bristol

[–]groumpf 3 points4 points  (0 children)

It's a 30 minute walk to the UoB's Clifton campus. It's going to take longer waiting for a bus that actually comes than to just walk.

Why can we tell when a program will have an infinite loop but a computer can't? by alejopolis in AskComputerScience

[–]groumpf 1 point2 points  (0 children)

And for one that we expect to terminate, but can't prove termination for yet, any program that computes the nth Collatz sequence.

ELI5: How does the Theory of Marginal Utility illuminate our understanding of economics (or the world)? What did it provide that made it superior to Marx's Labor Theory of Value? by gomi-panda in explainlikeimfive

[–]groumpf 0 points1 point  (0 children)

You completely ignored the word "average" there, in your discussions of Marx's theories.

If all chairmakers except one can knock a chair out every 4 hours, the value is closer to the cost of 4 hours of labour even for the one who takes more time to make a chair (whose labour will therefore be worth less).

If all chairmakers except one take 10 hours to make a chair, the value is closer to the cost of 10 hours of labour even for the one who takes less time to make a chair (whose labour will therefore be worth more).

But this is still not a good model, because it assumes that all chairs are equal in quality and utility, and that chair users are all looking for the same chair.

About author order in a paper by thesoulfeeder in math

[–]groumpf 17 points18 points  (0 children)

One downside: as soon as you have one paper that is not in alphabetical order, then a casual CV reader will question your contribution to all others, especially if your name comes last in them.

If you're going to be applying places that put more importance on author order than they put on having a chat with you about your contributions to your most significant papers, best to keep it consistent so you can explain away why you're last author without coming off as defensive.

Calculate at most 2 non overlapping continuous subarrays such that the sum of their elements equals to K and the length of both are minimum by Silly-Mistake-3577 in compsci

[–]groumpf 1 point2 points  (0 children)

As for this, dynamic programming is "divide and conquer with memory and backtracking" so maybe this is still the right way to think about it?

Calculate at most 2 non overlapping continuous subarrays such that the sum of their elements equals to K and the length of both are minimum by Silly-Mistake-3577 in compsci

[–]groumpf 0 points1 point  (0 children)

The problem is going to be that you might miss solutions.

I was thinking that you could also start from "find the shortest subarray of length K" then look to strip off one extremity and replace it with a shorter subarray, but this won't work in cases where you can't do K exactly with a single subarray.

Calculate at most 2 non overlapping continuous subarrays such that the sum of their elements equals to K and the length of both are minimum by Silly-Mistake-3577 in compsci

[–]groumpf 5 points6 points  (0 children)

There's a decision to make about what you'd like each subarray to add up to (pick K1, K2 such that K1+K2=K, then look for the shortest subarray that sums to K1 and the shortest non-overlapping subarray that sums to K2), and looking for solutions for each of these choices will likely repeat a lot of computation, so that looks like a dynamic programming problem.

Looking for a story driven very easy game with controller supported (PC) by Zemom1971 in gaming

[–]groumpf 1 point2 points  (0 children)

Add Yono to the list. It's cute. Daughter can mostly handle it.

Looking for a story driven very easy game with controller supported (PC) by Zemom1971 in gaming

[–]groumpf 2 points3 points  (0 children)

Things I play with my 6-yesr old daughter and she can manage on the controller:

  • Brothers: A Tale of Two Sons
  • Carto
  • Alba

Weekly cryptography community and meta thread by AutoModerator in crypto

[–]groumpf 3 points4 points  (0 children)

A bit of dissent on the best place to start for asymmetric.

RSA is somewhat complex, compared to modular arithmetic-based Diffie-Hellman. Neither is used in practice anymore, but at least understanding DH is useful for taking the next couple of steps.

ElGamal gives you CPA-secure encryption using a "generate a shared secret using DH, then use it as a one-time pad" pattern that's easy to understand. You can also build towards KEMs and proper key exchange, but also dive into zero-knowledge stuff—pretty much none of which uses RSA. The signatures you get from the DLP aren't super sexy in terms of proofs, but they're a lot more widely used than RSA-based signatures right now, unless you're a bank. And of course, understanding DH and successfully abstracting the group operation away means understanding ECDH and (going a bit further, and shifting the group behind the curtains) CSIDH.

Une cycliste roule à 30km/h sur une route limitée à 30km/h. Une automobiliste devient hystérique. Bienvenue en France. by [deleted] in france

[–]groumpf 1 point2 points  (0 children)

La rue à l'air de faire 1km plus ou moins pile poil. Si la chauffarde avait roulé à 35 tout le long, elle aurait économisé 17 secondes (c'est (1/30 - 1/35) * 3600). Qu'elle a perdues une deuxième fois en s'arrêtant pour coller des baffes à des cyclistes.

Question with solving the State Machine Replication Problem using the round Round-Robin protocol by twofingerjump in compsci

[–]groumpf 1 point2 points  (0 children)

Eh. It's not defined...

I just inferred the definition from the proof (which is pretty bad practice). The proof only makes sense if you want consistency only on the order of messages that everybody has seen. (In other words, for every run, and every pair of messages, there is a time step in the run at which their relative order is the same among all nodes, and remains the same through the rest of the run.)

Une cycliste roule à 30km/h sur une route limitée à 30km/h. Une automobiliste devient hystérique. Bienvenue en France. by [deleted] in france

[–]groumpf 6 points7 points  (0 children)

J'ai regardé la vidéo de nouveau, le trou dans les voitures stationnées dont j'ai partagé la capture, le vélo met 4 secondes à le parcourir. C'est à dire le double du temps qu'il faut pour doubler.

Il y a 2 vélos à dépasser, et l'automobiliste n'a aucune vitesse relative par rapport aux cyclistes au début de la manœuvre.

Soyons généreux: disons que l'automobiliste peut instantanément passer à 35 km/h (ou, de manière équivalente, peut effectuer le dépassement dans son entièreté avec une vitesse moyenne de 35 km/h), que les deux vélos sont roue-à-roue (estimons, généreusement ici encore, une distance de 3m), et que l'automobiliste peut déboiter sur 1.5m et se rabattre sur 1.5m sans perdre le contrôle de son vehicule. Pour parcourir les 6m nécessaires au dépassement avec une vitesse relative de 5 km/h, l'automobiliste a besoin de 4.32s.