You are here |
blog.cryptographyengineering.com | ||
| | | |
paragonie.com
|
|
| | | | A human-readable overview of commonly misused cryptography terms and fundamental concepts. | |
| | | |
soatok.blog
|
|
| | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | |
keymaterial.net
|
|
| | | | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not... | |
| | | |
www.globalsign.com
|
|
| | What is Certificate Transparency or CT Policy? Here's everything you need to know about Certificate Transparency (CT), including how it works and how you can comply with Google's policy. |