|
You are here |
www.laurentluce.com | ||
| | | | |
quantumloom.in
|
|
| | | | | A simple guide to how cryptography keeps your digital stuff safe-from secret codes to secure messages. | |
| | | | |
pboyd.io
|
|
| | | | | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean.... | |
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective. | |
| | | | |
www.imperialviolet.org
|
|
| | | [AI summary] The article explains the mathematical foundations of elliptic curves, their group structure, and their application in cryptography, particularly the Diffie-Hellman key agreement protocol, while also discussing implementation challenges in finite fields. | ||