Dan Jones's repositories
firefox-command-palette
Control Firefox with Sublime/helm-M-x style fuzzy complete. Use it from the omnibar with the ; search prefix, or trigger a pop-up with Ctrl+Space.
rc4-key-recovery-attacks
Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used to crack WEP, but it targets schemes where the initialisation vector precedes the long term key.
remote-timing-attacks-are-practical
An attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.
beamer-to-pptx
Command line tool to convert Beamer-generated PDFs to Powerpoint files, using SVGs for lossless conversion and including speaker notes.
cage
A Wayland kiosk
cam-group-project-2014
project lima
computing-separable-functions-via-gossip
Implementation of the algorithm in "Computing separable functions via gossip." by Mosk-Aoyama, Damon, and Devavrat Shah.
crypto-algorithms
Basic implementations of standard cryptography algorithms, like AES and SHA-1.
data-science-toolbox-5
(Mis) Identifying Users by Command Usage: Fooling a neural network intrusion detection system.
mls-protocol
MLS protocol
paper-template
skeleton LaTeX paper template
rhul-isg-beamer
The .sty file for the Royal Holloway ISG Beamer template. Also included is an example presentation using the RHUL Style.