|
You are here |
blog.gtank.cc | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | By Tjaden Hess Earlier this week, NIST officially announced three standards specifying FIPS-approved algorithms for post-quantum cryptography. The Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) is one of these standardized algorithms. The Trail of Bits cryptography team has been anticipating this announcement, and we are excited to share an announcement of our own: we built an... | |
| | | | |
berty.tech
|
|
| | | | | Digital Signatures The digital signature (sometimes called an electronic signature) isn't a literal digitalized signature. In layman's terms, it is a procedure that guarantees the integrity and the authenticity of digital documents and messages. The name of a digital signature comes from the analogy with the handwritten signature of a paper document. Everyone knows that there is a lot of paperwork in the world of business. And, where there is paperwork, there is a lot of validation, approvals, etc. | |
| | | | |
blog.quarkslab.com
|
|
| | | | | Quarkslab team performed a cryptographic & security assessment of the Bulletproof protocol, a new non-interactive zero-knowledge proof protocol, to be used by the Monero open-source cryptocurrency (XMR). We found several issues, some possibly critical, during the analysis. | |
| | | | |
ankane.org
|
|
| | | It feels like data breaches are showing up every week in the news. If you haven't taken a second look at how you're storing sensitive data, now is... | ||