|
You are here |
neilmadden.blog | ||
| | | | |
durumcrustulum.com
|
|
| | | | | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(... | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
cronokirby.com
|
|
| | | | | - Read more: https://cronokirby.com/posts/2023/06/a-sketch-of-synthetic-cryptography/ | |
| | | | |
blog.apdu.fr
|
|
| | | Some smartphones can handle 2 SIM cards. The smartphones now use eSIM (embedded SIM) instead of rSIM (removable SIM). It is still useful to have 2 subscriber configurations so the same eSIM should sup | ||