|
You are here |
blog.josefsson.org | ||
| | | | |
crackstation.net
|
|
| | | | | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly. | |
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
8yd.no
|
|
| | | | | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n... | |
| | | | |
soatok.blog
|
|
| | | Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the... | ||