Explore >> Select a destination


You are here

neilmadden.blog
| | soatok.blog
11.2 parsecs away

Travel
| | Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the...
| | durumcrustulum.com
12.0 parsecs away

Travel
| | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(...
| | keymaterial.net
11.8 parsecs away

Travel
| | If you have been terminally online on IETF mailing lists, you might have seen this thread, where, in extremely uncharacteristic fashion for the IETF, everybody just agreed to only use the seed used in key generation for ML-KEM's private key instead of the format defined by NIST, something allowed by the NIST standard, but not...
| | sendbird.com
107.7 parsecs away

Travel
| Check out the best secure messaging apps on the market, and learn how to choose the best encrypted messaging app for your business needs.