Explore >> Select a destination


You are here

akircanski.github.io
| | www.schneier.com
7.7 parsecs away

Travel
| | Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto's rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.) Shamir presented few details-and there's no paper-but the time complexity of the new attack is 263. (Their previous result was 269; brute force is 280.) He did say that he expected Wang and her students to improve this result over the next few months. The modifications to their published attack are still new, and more improvements are likely over the next several months. There is no reason to believe that 2...
| | dgroshev.com
7.5 parsecs away

Travel
| | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses.
| | carterbancroft.com
6.9 parsecs away

Travel
| | These days, there are two major "categories" of encryption. Symmetric key encryption and Asymmetric key encryption. Today we're going to talk about the symmetric side of things. What is it? How does it work? Examples, etc. Let's dive in. What is it? Symmetric encryption is any cipher algorithm where plaintext
| | notes.volution.ro
27.1 parsecs away

Travel
| About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.