Explore >> Select a destination


You are here

soatok.blog
| | durumcrustulum.com
1.2 parsecs away

Travel
| | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(...
| | www.paragonie.com
2.2 parsecs away

Travel
| | A deep dive into preventing chosen-ciphertext (e.g. padding oracle) attacks against RSA in custom encrypted transport protocols.
| | kel.bz
0.8 parsecs away

Travel
| | [AI summary] A technical analysis of RSA-based Key Encapsulation Mechanisms, highlighting vulnerabilities in unpadded RSA and explaining the secure alternative known as RSA-KEM with OAEP.
| | www.jeremykun.com
20.5 parsecs away

Travel
| So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.