Explore >> Select a destination


You are here

royvanrijn.com
| | tashian.com
3.1 parsecs away

Travel
| | The story of a major hash table vulnerability, and how it took a decade to uncover and resolve.
| | dusted.codes
1.9 parsecs away

Travel
| | SHA-256 is not a secure password hashing algorithm
| | www.sjoerdlangkemper.nl
3.2 parsecs away

Travel
| | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure.
| | kndrck.co
18.9 parsecs away

Travel
| Motivation RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and is different from the decryption key which is kept secret. If I wanted to comprehend zero knowledge proofs, then understanding the grand-daddy of public-key cryptosystems is a must. Background Maths Exponential Rules 1 $$ \begin{align} \label{eq:exponent_rule} g^{a-b} &= \dfrac{g^a}{g^b} \newline g^{a+b} &= g^a g^b \n...