|
You are here |
sookocheff.com | ||
| | | | |
andreabergia.com
|
|
| | | | | This post is part of the Writing a JVM in Rust series. I have written a JVM in Rust ??thispost A JVM in Rust part 2 - The class files format A JVM in Rust part 3 - Parsing class files A JVM in Rust part 4 - The Java bytecode A JVM in Rust part 5 - Executing instructions A JVM in Rust part 6 - Methods and exceptions A JVM in Rust part 7 - Objects and GC A JVM in Rust part 8 - Retrospective Lately Ive been spending quite a bit of time learning Rust, and as any sane person would do, after writing a few 100 ... | |
| | | | |
bruceeckel.com
|
|
| | | | | ||
| | | | |
www.trailofbits.com
|
|
| | | | | [AI summary] The text discusses various cryptographic constructions and their vulnerabilities. It highlights the importance of using established cryptographic primitives like HMAC, KMAC, and modern password-based key derivation functions (PBKDFs) instead of ad-hoc solutions. Key points include the risks of ambiguous encoding in MAC and hash functions, length-extension attacks, and the need for memory-hard KDFs to resist brute-force attacks. The text also touches on the broader implications of cryptographic design, emphasizing the necessity of rigorous standards and avoiding simplistic approaches that can lead to significant security weaknesses. | |
| | | | |
renato.athaydes.com
|
|
| | | |||