Steve Weis
@sweis
Researcher, engineer, and entrepreneur interested in cryptography, security, privacy, and machine learning.
1/2 "We need help!" @AnthropicAI's Nicholas Carlini called for cryptanalysis experts to join efforts to make ML safe, at the Simons Institute's workshop on Cryptography 10 Years Later: Obfuscation, Proof Systems, and Secure Computation Boot Camp Video: simons.berkeley.edu/talks/nicholas…
The Chinese government launched a new digital ID last week. I’m looking for technical details. Some summaries: twobirds.com/en/insights/20… tc260.org.cn/upload/2020-09…
Last week I pitched my Quantum Algorithms: A Call to Action blog post to top theorists at the Simons Institute. Watch the talk + discussion (starts ~1h in): youtube.com/watch?v=7F5LBN… Blog post here: quantumfrontiers.com/2025/04/20/qua…
[New] Gdel in Cryptography: Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness (Rahul Ilango) ia.cr/2025/1296
Check out two recent blog posts from our team: 1) Graph Foundation Models, and how they help achieve 3-40x in precision: research.google/blog/graph-fou… 2) Enabling efficient Multi-Vector retrieval, via MUVERA: research.google/blog/muvera-ma… (based on our NeuRIPS'24 paper).
What's obfuscation in computing? @UCLA's Amit Sahai jokingly began his tutorial with a "gruesomely human" analogy, at the Simons Institute's workshop on Cryptography 10 Years Later: Obfuscation, Proof Systems, and Secure Computation Boot Camp. Video here: simons.berkeley.edu/talks/amit-sah…
Despite all of their complexity, digital encryption schemes are more fragile than you might think. quantamagazine.org/computer-scien…
FOKS by @maxtaco "is like Keybase, but fully open-source and federated, with SSO and YubiKey support": blog.foks.pub/posts/introduc…
Collaboration, competition, and community are key to exploring a variety of paths to post-quantum cryptographic resilience, @durumcrustulum explains on the new episode of EFF’s “How to Fix the Internet." eff.org/deeplinks/2025…
Google open sources a zero knowledge proof library for identity protocols called Longfellow: github.com/google/longfel… blog.google/technology/saf…
Cloudflare released an E2EE video calling app based on MLS: blog.cloudflare.com/orange-me2eets…
Introducing Shadow Hamiltonian Simulation, a breakthrough in quantum simulation for the efficient study of systems like free bosons and free fermions that are exponentially large, providing exponential quantum speedups. Read the full research → goo.gle/4hTMby0
This week at the Simons Institute, a workshop on Obfuscation. simons.berkeley.edu/workshops/obfu…
Alfred Menezes intro course on hash-based, post-quantum signature schemes, e.g. LMS and XMSS. Slides: cryptography101.ca/hash-based-sig… Videos: youtube.com/playlist?list=…
CCC’25 will take place August 5-8 at the Fields Institute in Toronto! Students/postdocs (from any institution) are eligible to apply for a travel allowance. For full consideration, please apply by June 20; awards to be announced on June 25. computationalcomplexity.org/travelAllowanc…
1/ Earlier this year, @yuval_domb discovered Logjumps — a more efficient way to do large-prime field multiplication than Montgomery multiplication. So much modern crypto relies on modular multiplication — all the way from TLS sessions to elliptic-curve based ZK proofs.
iOS CryptoKit has beta support for post-quantum crypto including ML-KEM and ML-DSA: developer.apple.com/documentation/…