|
You are here |
blog.chewxy.com | ||
| | | | |
joeduffyblog.com
|
|
| | | | | Joe Duffy's Blog | Adventures in the high-tech underbelly | |
| | | | |
www.trailofbits.com
|
|
| | | | | [AI summary] The text discusses various cryptographic constructions and their vulnerabilities. It highlights the importance of using established cryptographic primitives like HMAC, KMAC, and modern password-based key derivation functions (PBKDFs) instead of ad-hoc solutions. Key points include the risks of ambiguous encoding in MAC and hash functions, length-extension attacks, and the need for memory-hard KDFs to resist brute-force attacks. The text also touches on the broader implications of cryptographic design, emphasizing the necessity of rigorous standards and avoiding simplistic approaches that can lead to significant security weaknesses. | |
| | | | |
bartoszmilewski.com
|
|
| | | | | This is part of the book Category Theory for Programmers. The previous instalment was Category: The Essence of Composition. See the Table of Contents. The category of types and functions plays an important role in programming, so let's talk about what types are and why we need them. Who Needs Types? There seems to be... | |
| | | | |
www.techelevator.com
|
|
| | | The relationship between math and programming and answering the question "How much math do I need to be good at this?" | ||