Explore >> Select a destination


You are here

cronokirby.com
| | notes.volution.ro
14.2 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | keymaterial.net
14.8 parsecs away

Travel
| | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key...
| | www.jeremykun.com
12.7 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | www.darktrace.com
35.8 parsecs away

Travel
| Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.