Explore >> Select a destination


You are here

www.wpsoftware.net
| | blog.blockstream.com
4.9 parsecs away

Travel
| | Bitcoin lets users choose rules to control how their funds can be spent and have them automatically enforced by the network.
| | blog.trailofbits.com
6.0 parsecs away

Travel
| | The elliptic curve digital signature algorithm (ECDSA) is a common digital signature scheme that we see in many of our code reviews. It has some desirable properties, but can also be very fragile. For example, LadderLeak was published just a couple of weeks ago, which demonstrated the feasibility of key recovery with a side channel [...]
| | keymaterial.net
3.1 parsecs away

Travel
| | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key...
| | www.authgear.com
17.1 parsecs away

Travel
| Sessions and Tokens, which of these authentication methods best suits your website or application? Let's find out.