|
You are here |
meshtastic.org | ||
| | | | |
www.micah.soy
|
|
| | | | | A storytelling approach in the style of Blade Runner for introducing cryptography concepts. | |
| | | | |
rog3rsm1th.github.io
|
|
| | | | | The Okamoto-Uchiyama cryptosystem is a semantically secure, asymmetric encryption algorithm. It was first introduced in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The method is additive-homomorphic, which means that the plaintexts are added by multiplying two ciphertexts. It is therefore not necessary to decrypt the ciphertexts in order to be able to operate on the plaintexts. While searching for implementations of this algorithm on github, I realized that there were only two rough implementations. | |
| | | | |
neilmadden.blog
|
|
| | | | | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it... | |
| | | | |
csirt.lacnic.net
|
|
| | | The main purpose of the project is to alert and recommend possible corrections for DNS Resolvers on IPv4. | ||