Explore >> Select a destination


You are here

meshtastic.org
| | neilmadden.blog
2.7 parsecs away

Travel
| | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it...
| | www.zend.com
3.9 parsecs away

Travel
| | Libsodium is a modern cryptography library. Learn how you can use the Libsodium cryptography library for PHP encryption.
| | rog3rsm1th.github.io
4.7 parsecs away

Travel
| | The Okamoto-Uchiyama cryptosystem is a semantically secure, asymmetric encryption algorithm. It was first introduced in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The method is additive-homomorphic, which means that the plaintexts are added by multiplying two ciphertexts. It is therefore not necessary to decrypt the ciphertexts in order to be able to operate on the plaintexts. While searching for implementations of this algorithm on github, I realized that there were only two rough implementations.
| | benjamintseng.com
21.5 parsecs away

Travel
| One of the most exciting areas of technology development, but that doesn't get a ton of mainstream media coverage, is the race to build a working quantum computer that exhibits "below threshold quantum computing" - the ability to do calculations utilizing quantum mechanics accurately. One of the key limitations to achieving this has been the...