Explore >> Select a destination


You are here

soatok.blog
| | www.livescience.com
4.4 parsecs away

Travel
| | When quantum computers become commonplace, current cryptographic systems will become obsolete. Scientists are racing to get ahead of the problem and keep our data secure.
| | scottarc.blog
3.0 parsecs away

Travel
| | Musing about Password-Based Cryptography for the Government What would a modern NIST standard for password-based cryptography look like? Obviously, we have PBKDF2--which, if used with a FIPS-approved hash function, gives you a way to derive encryption keys and/or password validators from human-memorable secrets. However, PBKDF2 isn't memory-hard. In 2012, several cryptographers initiated the Password Hashing...
| | notes.volution.ro
3.5 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | simonbs.dev
20.3 parsecs away

Travel
| Here's how to easily move your passwords from 1Password to iCloud Keychain