You are here |
educatedguesswork.org | ||
| | | |
www.netmeister.org
|
|
| | | | It's 2024 - do you know where your post-quantum cryptography is? | |
| | | |
neilmadden.blog
|
|
| | | | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it... | |
| | | |
soatok.blog
|
|
| | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | |
github.com
|
|
| | Extension for devise, enable login as functionality. Add link to the masquerade_path(resource) and use it. - bump new version 1.3.0 · oivoodoo/devise_masquerade@bc0d09d |