Explore >> Select a destination


You are here

hardenedvault.net
| | www.jeremykun.com
11.8 parsecs away

Travel
| | Last time we saw the Diffie-Hellman key exchange protocol, and discussed the discrete logarithm problem and the related Diffie-Hellman problem, which form the foundation for the security of most protocols that use elliptic curves. Let's continue our journey to investigate some more protocols. Just as a reminder, the Python implementations of these protocols are not at all meant for practical use, but for learning purposes. We provide the code on this blog's Github page, but for the love of security don't actually use them.
| | blog.wesleyac.com
11.2 parsecs away

Travel
| |
| | www.reversemode.com
11.5 parsecs away

Travel
| | -------------- Update from 06/10/2023 : following my publication, I've been in contact with France Identité CISO and they could provide mo...
| | www.c4isrnet.com
62.3 parsecs away

Travel
| Can much-hyped technologies, such as blockchain, provide answers to long-standing cryptographic problems for the government? Maybe.