You are here |
soatok.blog | ||
| | | |
keymaterial.net
|
|
| | | | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not... | |
| | | |
durumcrustulum.com
|
|
| | | | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(... | |
| | | |
neilmadden.blog
|
|
| | | | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that... | |
| | | |
dusted.codes
|
|
| | SHA-256 is not a secure password hashing algorithm |