Explore >> Select a destination


You are here

keymaterial.net
| | soatok.blog
12.4 parsecs away

Travel
| | Historical Context of Iota's Hash Functions Once upon a time, researchers discovered that the hash function used within the Iota cryptocurrency (Curl-P), was vulnerable to practical collisions. When pressed about this, the Iota Foundation said the following: https://twitter.com/durumcrustulum/status/1083859956841889792 You can read this statement from the source here. Archived here. In response to this research, the...
| | blog.trailofbits.com
10.9 parsecs away

Travel
| | Here at Trail of Bits we review a lot of code. From major open source projects to exciting new proprietary software, we've seen it all. But one common denominator in all of these systems is that for some inexplicable reason people still seem to think RSA is a good cryptosystem to use. Let me save [...]
| | neilmadden.blog
7.1 parsecs away

Travel
| | Wikipedia's definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient. -Wikipedia They also have a handy diagram of the process...
| | neilmadden.blog
76.3 parsecs away

Travel
| There has been a lot of discussion recently around the LastPass breach, especially with regards to the number of PBKDF2 iterations applied to the master password to derive the vault encryption key. Other people have already dissected this particular breach, but I want to more generally talk about PBKDF2 iterations and security models. (I'm not...