Explore >> Select a destination


You are here

soatok.blog
| | keymaterial.net
10.0 parsecs away

Travel
| | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not...
| | durumcrustulum.com
8.6 parsecs away

Travel
| | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(...
| | neilmadden.blog
11.2 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | dusted.codes
81.1 parsecs away

Travel
| SHA-256 is not a secure password hashing algorithm