|
You are here |
www.schneier.com | ||
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
thomasbandt.com
|
|
| | | | | Analyzing quantum computing's impact on cryptography, this post briefly discusses challenges in encryption and advances in post-quantum cryptography, emphasizing the race for quantum-resistant security. | |
| | | | |
paragonie.com
|
|
| | | | | A human-readable overview of commonly misused cryptography terms and fundamental concepts. | |
| | | | |
palant.info
|
|
| | | Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems. | ||