Explore >> Select a destination


You are here

sergioprado.blog
| | dgl.cx
3.7 parsecs away

Travel
| |
| | www.arcserve.com
1.8 parsecs away

Travel
| | Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms.
| | neilmadden.blog
3.8 parsecs away

Travel
| | There has been a lot of discussion recently around the LastPass breach, especially with regards to the number of PBKDF2 iterations applied to the master password to derive the vault encryption key. Other people have already dissected this particular breach, but I want to more generally talk about PBKDF2 iterations and security models. (I'm not...
| | www.jeremykun.com
16.1 parsecs away

Travel
| This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes. The basis for many FHE schemes, as well as other privacy-preserving protocols, is the Learning With Errors (LWE) problem.