|
You are here |
hardenedvault.net | ||
| | | | |
www.jeremykun.com
|
|
| | | | | Last time we saw the Diffie-Hellman key exchange protocol, and discussed the discrete logarithm problem and the related Diffie-Hellman problem, which form the foundation for the security of most protocols that use elliptic curves. Let's continue our journey to investigate some more protocols. Just as a reminder, the Python implementations of these protocols are not at all meant for practical use, but for learning purposes. We provide the code on this blog's Github page, but for the love of security don't actually use them. | |
| | | | |
blog.wesleyac.com
|
|
| | | | | ||
| | | | |
www.reversemode.com
|
|
| | | | | -------------- Update from 06/10/2023 : following my publication, I've been in contact with France Identité CISO and they could provide mo... | |
| | | | |
www.c4isrnet.com
|
|
| | | Can much-hyped technologies, such as blockchain, provide answers to long-standing cryptographic problems for the government? Maybe. | ||