You are here |
paragonie.com | ||
| | | |
neilmadden.blog
|
|
| | | | If you read or watch any recent tutorial on symmetric (or "secret key") cryptography, one lesson should be clear: in 2018 if you want to encrypt something you'd better useauthenticated encryption.This not only hides the content of a message, but also ensures that the message was sent by one of the parties that has access... | |
| | | |
www.vanimpe.eu
|
|
| | | | Cryptography Introduction Cheatsheet, Private Communications in a Public World | |
| | | |
www.cryptofails.com
|
|
| | | | Reasoning by Lego: The wrong way to think about cryptography. Scott Arciszewski from Paragon Initiative pointed me to this example of PHP cryptography. The code is bad and the crypto design is flawed,... | |
| | | |
berty.tech
|
|
| | Cryptography in one form or other is everywhere online, from banking sites to personal communication apps. But it's not a modern invention. When exactly did it arise? And what developments has it undergone over the years? The history of cryptography runs parallel to the development of new communication methods and safer transactions. Learn more about it to understand just how important it has become. |