Explore >> Select a destination


You are here

blog.trailofbits.com
| | soatok.blog
1.9 parsecs away

Travel
| | Let's talk about digital signature algorithms. Digital signature algorithms are one of the coolest ideas to come out of asymmetric (a.k.a. public-key) cryptography, but they're so simple and straightforward that most cryptography nerds don't spend a lot of time thinking about them. Even though you are more likely to run into a digital signature as...
| | dadrian.io
2.3 parsecs away

Travel
| | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit...
| | scottarc.blog
1.5 parsecs away

Travel
| | A very high-level view of [hybrid] post-quantum cryptography.
| | www.learnitguide.net
17.9 parsecs away

Travel
| create docker registry on linux, create own docker image registry, create private docker registry on linux, build own private docker registry on linux