Explore >> Select a destination


You are here

keymaterial.net
| | blog.cryptographyengineering.com
14.2 parsecs away

Travel
| | This is part five of a series on the Random Oracle Model. See here for the previous posts: Part 1: An introduction Part 2: The ROM formalized, a scheme and a proof sketch Part 3: How we abuse the ROM to make our security proofs work Part 4: Some more examples of where the ROM...
| | neilmadden.blog
9.8 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | soatok.blog
8.4 parsecs away

Travel
| | There is, at the time of this writing, an ongoing debate in the Crypto Research Forum Group (CFRG) at the IETF about KEM combiners. One of the participants, Deirdre Connolly, wrote a blog post titled How to Hold KEMs. The subtitle is refreshingly honest: "A living document on how to juggle these damned things." Deirdre...
| | www.zluri.com
69.4 parsecs away

Travel
| Discover the proven 5 user provisioning best practices recommended by experts.