Explore >> Select a destination


You are here

sethmlarson.dev
| | educatedguesswork.org
3.1 parsecs away

Travel
| |
| | securityinaction.wordpress.com
3.7 parsecs away

Travel
| | ==================== TL; DR With the recent publication of post quantum cryptography (PQC) algorithms from NIST, organisations of all size should begin the transition to PQC. Please refer to this PQC readiness publication from CISA as a starting point. ==================== To assist with the transition to PQC, I have provided advice below for government agencies and...
| | dadrian.io
4.8 parsecs away

Travel
| | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit...
| | kndrck.co
20.6 parsecs away

Travel
| Motivation In my quest to understand zero knowledge proofs from the ground up, I've decided to go back to the basics, and really understand how everyday cryptography tools work, not just how to use them. In this post, I'll attempt to explain how and why the diffie hellman key exchange protocol works, along with proofs and a working example. The examples are purely for educational purposes only! Introduction The Diffie-Hellman key exchange protocol is an algorithm that allows two parties to generate a uni...