You are here |
blog.cryptographyengineering.com | ||
| | | |
dgroshev.com
|
|
| | | | ||
| | | |
soatok.blog
|
|
| | | | Ever since the famous "Open Sesame" line from One Thousand and One Nights, humanity was doomed to suffer from the scourge of passwords. Courtesy of SwiftOnSecurity Even in a world where we use hardware tokens with asymmetric cryptography to obviate the need for passwords in modern authentication protocols, we'll still need to include "something you... | |
| | | |
www.jeremykun.com
|
|
| | | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | |
| | | |
www.puppet.com
|
|
| | Threat vulnerability management across your entire attack surface has higher stakes than ever before - here's where automation can help. |