MIRACL LABS:  Explore the latest insights and knowledge about innovations in cryptography.

About MIRACL Labs

Dr. Mike Scott serves as the director of MIRACL Laboratories, a Dublin-based center of excellence whose mission is to promote innovation in the field of elliptic curve and pairing-based cryptography.

He also heads up all things crypto at MIRACL as our Chief Cryptographer. His MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) cryptographic library is used in the defense, embedded, and mobile industries to build highly secure “number-theoretic cryptography” into their hardware, applications, and end user experiences.

Read the Latest from Dr. Mike

1 Nov 2016

A Note on the Implementation of Format Preserving Encryption Modes

The American National Institue for Standards in Technology (NIST) is considering ...

Read full article

25 Oct 2016

Ed3363 (HighFive) – An alternative Elliptic Curve

  We propose a new Elliptic curve at a security level significantly greater than the ...

Read full article

17 Oct 2016

Key-Escrow-less M-Pin

We have been tasked to harden the M-Pin protocol against a “key-escrow” attacker, who has ...

Read full article

10 Oct 2016

Using M-Pin with Geo-location/Geo-fencing

M-Pin is a Multi-Factor identity based authentication protocol. Secret authen-tication ...

Read full article

3 Oct 2016

Migrating SOK to a type-3 Pairing

The non-interactive authenticated key exchange protocol known as SOK after its inventors ...

Read full article

26 Sep 2016

M-Pin Full Technology (Version 3.1)

M-Pin is a two-factor authentication protocol which has been proposed as an alternative ...

Read full article

20 Sep 2016

Late Binding for the M-Pin protocol

The M-Pin protocol has been proposed for use in a setting which uses multiple Trusted ...

Read full article

13 Sep 2016

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

Here we introduce the M-Pin client-server protocol, which features two-factor client ...

Read full article

5 Sep 2016

Electronic Voting

With the elections looming in America, the issue of the security of electronic voting is ...

Read full article

30 Aug 2016

The Essence of the Blockchain

Here we attempt a simple explanation of the blockchain for a not overly technical ...

Read full article

24 Aug 2016

The Apache Milagro Crypto Library (Version 2.0)

We introduce a multi-lingual crypto library, specifically designed to support the ...

Read full article

18 Aug 2016

A Poor Programmer’s Fix for Username/Password

You are a programmer that uses the Internet a lot. You don’t want to be one of those ...

Read full article

3 Aug 2016

The Authentication Dilemma

The Internet community is up in a heap about Username/Password, and what to replace it ...

Read full article

3 Aug 2016

The Carnac protocol – or how to read the contents of a sealed envelope

Johnny Carson as long time host of the Tonight show often appeared in the spoof role of ...

Read full article

3 Aug 2016

Another Computer Language Comparison

In this article we describe our experience in implementing a high performance ...

Read full article

26 May 2016

Missing a trick: Karatsuba variations

There are a variety of ways of applying the Karatsuba idea to multi-digit multiplication. ...

Read full article

22 Apr 2015

Re-imagining Internet Security Infrastructure

It’s time for a re-boot of the Internet’s security infrastructure. The last two years ...

Read full article

21 Feb 2015

Whatever it is, it needs security

The ubiquity of “things” is both a strength and a weakness when considering the potential ...

Read full article

2 Feb 2015

Crypto Security - How many bits?

Very recently we have seen some progress in the cryptanalysis of Elliptic curves. This ...

Read full article

20 Nov 2014

A Brief History of Authentication

Introduction We authenticate ourselves multiple times every day. Every time we open a ...

Read full article

3 Mar 2014

Security within the Financial Sector

Global Banking & Finance Review recently spoke with Brian Spector, CEO, MIRACL (formerly ...

Read full article

24 Oct 2013

Backdoors in NIST elliptic curves

Cryptography is a lot about trust. And in the real world cryptography depends on ...

Read full article

21 Aug 2013

2 step verification vs 2 factor authentication

Several super high profile smash and grab attacks on global scale cloud service providers ...

Read full article