|
You are here |
sequoia-pgp.org | ||
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google's end-to-end email extension. This is a Big Deal. With providers like Google and Yahoo onboard, email encryption is bound to get a big kick in the ass. This is something email badly needs. So great work by Google and Yahoo! | |
| | | | |
palant.info
|
|
| | | | | Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems. | |
| | | | |
mikegerwitz.com
|
|
| | | | | [AI summary] The article discusses the importance of end-to-end encryption and the potential risks of government surveillance and backdoors. It highlights the role of free software, decentralization, and federation in ensuring user privacy and control over data. The author emphasizes the need for ongoing debate and awareness about encryption, privacy, and digital rights. | |
| | | | |
andrea.corbellini.name
|
|
| | | [AI summary] The text provides an in-depth explanation of elliptic curve cryptography (ECC), covering fundamental concepts such as elliptic curves over finite fields, point addition, cyclic subgroups, subgroup orders, and the discrete logarithm problem. It also discusses practical aspects like finding base points, cofactors, and the importance of choosing subgroups with high order for cryptographic security. The text emphasizes that ECC relies on the difficulty of solving the discrete logarithm problem on elliptic curves, which is considered computationally hard and forms the basis for secure cryptographic protocols like ECDH and ECDSA. | ||