#ThalesHorizons

Duncan JonesSeptember 16, 2019

We need to talk about Go

I love the Go programming language. It’s easy to use, concise and powerful. These characteristics appeal to the typical programmer’s mindset. Yet, the brevity of the language can…

Read More
Jia LiuAugust 26, 2019

Identity-based cryptography

Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an experiment [15] conducted for analysing the…

Read More
Duncan JonesJune 03, 2019

Quantum-Resistant TLS in Go

Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken by quantum computers. Even though attackers…

Read More
Alastair ClarkMay 13, 2019

Going Native with Kubernetes Operators

With an increasing shift to micro-services architectures, the ecosystem seems to be in a steady cycle of increasing complexity, followed by a new tool to help us manage that…

Read More
Andrew MobbsApril 17, 2019

Engineering Secure Systems

Systems The word “system” comes from the Greek σύστημα, a whole thing made of parts, or a composition. When we discuss the behaviour of systems, we’re discussing the emergent…

Read More
Jia LiuMarch 20, 2019

Bitslicing for Constant Time Cryptography

Bitslicing is a software implementation strategy for achieving constant time cryptographic algorithms to prevent cache and timing side-channel attacks. This blog post will give an…

Read More
Sean BurtonFebruary 13, 2019

Crafting the Perfect Pipeline in GitLab

Introduction When using a traditional single-server CI, fast/incremental builds are simple. Each time the CI builds your pipeline, it is able to use the same workspace, preserving…

Read More
Duncan JonesJanuary 17, 2019

EST: The Forgotten Standard

We have seen an explosion in certificate use in recent years. This is partly due to the trend towards miniaturization. The monolithic applications of old are now deployed as…

Read More
Duncan JonesOctober 05, 2018

BADGER

This blog post covers our investigation and experimentation with threshold signature schemes, resulting in the construction, testing and integration of a modified threshold RSA…

Read More
Duncan JonesOctober 04, 2018

License to Clone

Recently we’ve been considering the topic of client licensing for systems based on the “software agent” model. A software agent is an application deployed onto multiple systems,…

Read More
Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us