|
You are here |
soatok.blog | ||
| | | | |
www.livescience.com
|
|
| | | | | When quantum computers become commonplace, current cryptographic systems will become obsolete. Scientists are racing to get ahead of the problem and keep our data secure. | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE - which stands forPassword Authenticated Key Exchange- is actually one of the most useful technologies that (almost) never gets used. It should be deployed everywhere, and yet it isn't.... | |
| | | | |
www.techradar.com
|
|
| | | Changes are coming | ||