Explore >> Select a destination


You are here

www.arch13.com
| | imapenguin.com
4.0 parsecs away

Travel
| | Have you been itching to do 64 Bit ARM assembly program like I have on your Raspberry Pi? I'll bet you have. I mean, the thing has to be useful for SOMETHING right? Most Raspbian installs are still on 32 bits, but switching is easy. Make backups and all that and then do: rpi-update Then edit /boot/config.txt and add: [pi] arm_64bit=1 Reboot That's all there is to it. Of you do a uname -m and see something with v 8 (not 7), you're done. Onto 64 bit assembly coding!
| | hilarymason.com
3.9 parsecs away

Travel
| | I travel quite a lot, and I've developed the habit of always texting myself my hotel room number so I don't forget it (unfortunately, I really do stay in that many hotels). I recently looked at my texts to myself and realized it seems like a reasonable set of random numbers. Hello, hotel-based entropy*! What...
| | negativesign.com
4.4 parsecs away

Travel
| | This one hits close to home. I can't imagine how the NIST staff involved in creating SP 800 (and more specifically, the SP 800-90A Dual Elliptic Curve Deterministic Random Bit Generation...bit) must feel. First of all, given the definition of a deterministic system, the title itself gives me pause. Maybe there's some next-level random number theory described in the standard, but I'm not sure I'd ever want a random number generator to exhibit deterministic behavior.
| | blog.cr.yp.to
28.1 parsecs away

Travel
| [AI summary] The text discusses the complexities and security concerns of the ECDSA (Elliptic Curve Digital Signature Algorithm) compared to more modern signature systems like Ed25519. It highlights issues such as the lack of constant-time implementations in ECDSA, the importance of secure random number generation (RNG) for generating nonces (k), and the vulnerabilities that can arise from poor RNG practices. The text also compares ECDSA with alternatives like Ed25519, which uses deterministic methods for generating k, thus avoiding the need for an RNG and enhancing security. Additionally, it touches on the design of secure RNGs, the role of hash functions in generating k, and the potential for attacks due to non-constant-time implementations and poor random...