|
You are here |
dkg.fifthhorseman.net | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates. | |
| | | | |
openpgp-wg.gitlab.io
|
|
| | | | | This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public-key or symmetric cryptographic algorithms, digital signatures, compression and key management. This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets ... | |
| | | | |
luxsci.com
|
|
| | | | | Find out exactly why email is inherently insecure and learn what can be done to improve your email security against the most common threats. | |
| | | | |
blog.nuculabs.de
|
|
| | | This is my first book review that I did my blog, I'm not really good at reviewing books and I'm not a native english speaker either, so bear with me and my clumsy english. I must also say that the subject covered by the book overwhelms me, I don't claim to be an expert on the topic and and to be honest I don't really want to become one, reading this book has provided me with enough information in order to be able to hold a basic discussion about cryptography related topics, had I put more effort, time and thought in this book I could probably become proficient. | ||