Explore >> Select a destination


You are here

trendless.tech
| | quantumloom.in
2.9 parsecs away

Travel
| | A simple guide to how cryptography keeps your digital stuff safe-from secret codes to secure messages.
| | www.arcserve.com
3.5 parsecs away

Travel
| | Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms.
| | notes.volution.ro
3.3 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | andrea.corbellini.name
23.0 parsecs away

Travel
| [AI summary] The text discusses the fundamentals of Elliptic Curve Cryptography (ECC), focusing on Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). It explains how ECDH enables secure key exchange and how ECDSA allows for digital signatures. The text also covers the importance of secure random number generation in ECDSA, highlighting the risks of using a predictable or static secret key, as seen in the PlayStation 3 incident. The discussion includes code examples for ECDH and ECDSA operations and the consequences of poor implementation practices. The text concludes by mentioning future articles on solving discrete logarithms and ECC compared to RSA.