# SineRider: play with functions posted November 2014

Ever fiddled with your TI-8x or played LineRider? Well this guy combined both and it looks awesome!

the game is here: http://sineridergame.com/

Hey! I'm **David**, the author of the Real-World Cryptography book. I'm a crypto engineer at O(1) Labs on the Mina cryptocurrency, previously I was the security lead for Diem (formerly Libra) at Novi (Facebook), and a security consultant for the Cryptography Services of NCC Group. This is my blog about **cryptography** and **security** and other related topics that I find interesting.

Ever fiddled with your TI-8x or played LineRider? Well this guy combined both and it looks awesome!

the game is here: http://sineridergame.com/

Well done! You've reached the end of my post. Now you can leave a comment or read something else.

Here are some random **popular** articles:

- - How to Backdoor Diffie-Hellman: quick explanation
- - Problems that UDP and only UDP has
- - Maybe you shouldn't skip SHA-3
- - A New Public-Key Cryptosystem via Mersenne Numbers
- - Hash-Based Signatures Part I: One-Time Signatures (OTS)
- - BEAST: An Explanation of the CBC Attack on TLS
- - Schnorr's Signature and non-interactive Protocols

Here are some random **recent** articles:

- - No, cryptocurrencies are not just about Bitcoin: Part 1
- - What is an inner product argument? Part 1
- - I'm now at O(1) Labs working on Mina protocol!!!
- - How does PLONK work? Part 3: Starting with the end: polynomials
- - How does PLONK work? Part 5: From arithmetic circuits to constraint systems
- - How does PLONK work? Part 9: Our final protocol! (Without the copy constraints)
- - David Wong's 7 rules of programming

My book **Real-World Cryptography** is finished and shipping! You can purchase it here.

If you don't know **where to start**, you might want to check these popular articles:

- - How to Backdoor Diffie-Hellman: quick explanation
- - Problems that UDP and only UDP has
- - Maybe you shouldn't skip SHA-3
- - A New Public-Key Cryptosystem via Mersenne Numbers
- - Hash-Based Signatures Part I: One-Time Signatures (OTS)
- - BEAST: An Explanation of the CBC Attack on TLS
- - Schnorr's Signature and non-interactive Protocols

Here are the latest **links** posted:

- 08 Dec Polynomials And Elliptic Curves Over Extension Fields
- 07 Dec The Joy Of Cryptography
- 06 Dec Understanding Hkdf
- 05 Dec Understanding Zero-Knowledge Proofs Through Illustrated Examples
- 04 Dec This Shouldn't Have Happened: A Vulnerability Postmortem (In Nss)

You can also **suggest a link**.

## Comments

## leave a comment...