|
You are here |
shibumi.dev | ||
| | | | |
www.jhanley.com
|
|
| | | | | Introduction For a new project, I must validate Azure Access Tokens in PHP. This requires obtaining the public key to validate the JWT signature. This article shows the process of working with the Azure OpenID Connect Metadata Document to obtain... Continue Reading ? | |
| | | | |
www.grc.com
|
|
| | | | | The Special Power of Extended Validation Certificates | |
| | | | |
blog.daknob.net
|
|
| | | | | ||
| | | | |
kndrck.co
|
|
| | | Motivation In my quest to understand zero knowledge proofs from the ground up, I've decided to go back to the basics, and really understand how everyday cryptography tools work, not just how to use them. In this post, I'll attempt to explain how and why the diffie hellman key exchange protocol works, along with proofs and a working example. The examples are purely for educational purposes only! Introduction The Diffie-Hellman key exchange protocol is an algorithm that allows two parties to generate a uni... | ||