|
You are here |
blog.slaks.net | ||
| | | | |
www.trailofbits.com
|
|
| | | | | [AI summary] The text discusses various cryptographic constructions and their vulnerabilities. It highlights the importance of using established cryptographic primitives like HMAC, KMAC, and modern password-based key derivation functions (PBKDFs) instead of ad-hoc solutions. Key points include the risks of ambiguous encoding in MAC and hash functions, length-extension attacks, and the need for memory-hard KDFs to resist brute-force attacks. The text also touches on the broader implications of cryptographic design, emphasizing the necessity of rigorous standards and avoiding simplistic approaches that can lead to significant security weaknesses. | |
| | | | |
steven-giesel.com
|
|
| | | | | [AI summary] The user has provided a list of blog posts and articles, primarily related to C# programming, .NET, and software development topics. The main focus areas include design patterns, asynchronous programming, performance optimization, and various C# features such as ValueTask, Task, and async/await. The user has also mentioned topics like API versioning, EF Core, and testing frameworks like bUnit and Playwright. The content is structured with a variety of articles, some of which are short posts or previews, and the user has included a note about an error in the application. | |
| | | | |
joeduffyblog.com
|
|
| | | | | Joe Duffy's Blog | Adventures in the high-tech underbelly | |
| | | | |
argumatronic.com
|
|
| | | Occasional writings about Haskell. | ||