|
You are here |
blog.perryizgr8.com | ||
| | | | |
tylerneylon.com
|
|
| | | | | ||
| | | | |
kevquirk.com
|
|
| | | | | Ever wondered how websites check your password? I mean, how can they check your password without being able to read it? It's a catch 22, surely? | |
| | | | |
pagefault.se
|
|
| | | | | I've been planning on writing a longer series of post about hash functions to learn more about how they work and what goes into designing good hash functions. During my research I stumbled upon something called Locality Sensitive Hashing. If you've used a hash function before or know something about them, you probably know that changing the input to a hash function by just a little bit produces a wildly different result. | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | This is the story of how a handful ofcryptographers 'hacked' the NSA.It's also a story of encryption backdoors, and why they never quite work out the way you want them to. But I think I'm getting ahead of myself a bit here. Today's Washington Post has the story of a nasty bugin some TLS/SSL servers... | ||