Explore >> Select a destination


You are here

soatok.blog
| | paragonie.com
1.6 parsecs away

Travel
| | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP
| | keymaterial.net
4.7 parsecs away

Travel
| | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not...
| | neilmadden.blog
3.0 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | palant.info
21.5 parsecs away

Travel
| Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems.