Explore >> Select a destination


You are here

soatok.blog
| | neilmadden.blog
11.2 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | paragonie.com
11.6 parsecs away

Travel
| | A human-readable overview of commonly misused cryptography terms and fundamental concepts.
| | blog.cryptographyengineering.com
20.5 parsecs away

Travel
| | Over the past several years I've been privileged to observe two contradictory and fascinating trends. The first is that we're finally starting to use the cryptography that researchers have spent the past forty years designing. We see this every day in examples ranging from encrypted messaging to phone security to cryptocurrencies. The second trend is...
| | lobsterpot.com.au
141.7 parsecs away

Travel
| I don't like to write about client situations, but this one seemed worth mentioning for the sake of other people experiencing the same thing, so I asked my client for permission and they agreed. Following an on-prem server reboot, anything that tried to connect to SQL Server on that server, using Windows Authentication, was getting [...]