Explore >> Select a destination


You are here

rdist.root.org
| | www.trickster.dev
4.9 parsecs away

Travel
| | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting
| | www.schneier.com
4.5 parsecs away

Travel
| | The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. This matters. The phrase "one-way hash function" might sound arcane and geeky, but hash functions are the workhorses of modern cryptography. They provide web security in SSL. They help with key management in e-mail and voice encryption: PGP, Skype, all the others. They help make it harder to guess passwords. They're used in virtual private networks, help provide DNS security and ensure that your automatic software updates are legitimate. They provide all sorts of security functions in your operating system. Every time you do something with security on the internet, a hash function is involved somewhere...
| | loup-vaillant.fr
2.8 parsecs away

Travel
| | So you want to roll your own crypto. Well, be careful. Be very careful.
| | www.imperialviolet.org
16.8 parsecs away

Travel
| [AI summary] The article explains the mathematical foundations of elliptic curves, their group structure, and their application in cryptography, particularly the Diffie-Hellman key agreement protocol, while also discussing implementation challenges in finite fields.