Explore >> Select a destination


You are here

cronokirby.com
| | neilmadden.blog
10.2 parsecs away

Travel
| | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it...
| | blog.cryptographyengineering.com
12.4 parsecs away

Travel
| | This is part five of a series on the Random Oracle Model. See here for the previous posts: Part 1: An introduction Part 2: The ROM formalized, a scheme and a proof sketch Part 3: How we abuse the ROM to make our security proofs work Part 4: Some more examples of where the ROM...
| | blog.cryptographyengineering.com
12.1 parsecs away

Travel
| | In general I try to limit this blog to posts that focus on generally-applicable techniques in cryptography. That is, I don't focus on the deeply wonky. But this post is going to be an exception. Today, I'm going to talk about a topic that most "typical" implementers don't -- and shouldn't -- think about. Specifically:...
| | mikegerwitz.com
87.7 parsecs away

Travel
|