|
You are here |
www.mitls.org | ||
| | | | |
adsecurity.org
|
|
| | | | | [AI summary] The article discusses the POODLE vulnerability in SSL 3.0, explaining its risks, exploitation scenarios, and mitigation strategies such as disabling SSL 3.0 and implementing TLS_FALLBACK_SCSV. | |
| | | | |
karla.io
|
|
| | | | | [AI summary] The author details their journey of building a custom SSH client, exploring the protocol's layers, algorithm negotiation, key exchange, and authentication processes. | |
| | | | |
martinralbrecht.wordpress.com
|
|
| | | | | Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications.... | |
| | | | |
dusted.codes
|
|
| | | The beauty of asymmetric encryption - RSA crash course for developers | ||