|
You are here |
soatok.blog | ||
| | | | |
keymaterial.net
|
|
| | | | | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not... | |
| | | | |
paragonie.com
|
|
| | | | | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP | |
| | | | |
emilymstark.com
|
|
| | | | | With the publication of Messaging Layer Security (MLS) as an RFC, I've been pulled into some recent discussion about bringing end-to-end encryption (E2EE) to the web. This is a topic that comes up every so often and has weirdly haunted me throughout my career. (I spent my undergrad and graduate research years working on cryptography implementations in Javascript and how to use them in applications.) | |
| | | | |
www.johndcook.com
|
|
| | | RSA encryption as a group automorphism. Lagrange's theorem applied to the group. Carmichael's totient function applied to RSA. | ||