Explore >> Select a destination


You are here

blog.josefsson.org
| | crackstation.net
3.0 parsecs away

Travel
| | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly.
| | dusted.codes
0.8 parsecs away

Travel
| | SHA-256 is not a secure password hashing algorithm
| | 8yd.no
2.8 parsecs away

Travel
| | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n...
| | soatok.blog
24.5 parsecs away

Travel
| Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the...