Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | neilmadden.blog
2.2 parsecs away

Travel
| | If you read or watch any recent tutorial on symmetric (or "secret key") cryptography, one lesson should be clear: in 2018 if you want to encrypt something you'd better useauthenticated encryption.This not only hides the content of a message, but also ensures that the message was sent by one of the parties that has access...
| | paragonie.com
2.8 parsecs away

Travel
| | A human-readable overview of commonly misused cryptography terms and fundamental concepts.
| | soatok.blog
3.9 parsecs away

Travel
| | There is, at the time of this writing, an ongoing debate in the Crypto Research Forum Group (CFRG) at the IETF about KEM combiners. One of the participants, Deirdre Connolly, wrote a blog post titled How to Hold KEMs. The subtitle is refreshingly honest: "A living document on how to juggle these damned things." Deirdre...
| | smartnets.etrovub.be
20.7 parsecs away

Travel
| CurveForge: generic, constant-time elliptic curves by construction in Rust. Or: how we implemented Montgomery curves in a few hours instead of a few weeks.