Explore >> Select a destination


You are here

www.cryptofails.com
| | www.schneier.com
3.8 parsecs away

Travel
| | The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. This matters. The phrase "one-way hash function" might sound arcane and geeky, but hash functions are the workhorses of modern cryptography. They provide web security in SSL. They help with key management in e-mail and voice encryption: PGP, Skype, all the others. They help make it harder to guess passwords. They're used in virtual private networks, help provide DNS security and ensure that your automatic software updates are legitimate. They provide all sorts of security functions in your operating system. Every time you do something with security on the internet, a hash function is involved somewhere...
| | paragonie.com
1.8 parsecs away

Travel
| | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP
| | soatok.blog
3.9 parsecs away

Travel
| | Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the...
| | teachingwithjenny.org
26.6 parsecs away

Travel
| Ideal places to start for Early Career Teachers Pedagogy (TS2 How pupils learn, TS4 Classroom practice, TS5 Adaptive teacher) T&L - Google DriveSummary of Kate Jones, Retrieval Practice T&L - Google Drive, Summary of Rosenshine's Principles of Instruction Principles of Instruction: Research-Based Strategies That All Teachers Should Know, by Barak Rosenshine; American Educator Vol. 36,...