Explore >> Select a destination


You are here

pboyd.io
| | notes.volution.ro
10.2 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | dgroshev.com
7.8 parsecs away

Travel
| |
| | 8yd.no
10.8 parsecs away

Travel
| | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n...
| | mathvoices.ams.org
72.7 parsecs away

Travel
| Mathematically, the most intriguing of the new proposals use lattices for message encryption... What will they do when quantum computers start working? Bill Casselman University of British Columbia Commercial transactions on the internet are invariably passed through a process that hides them from unauthorized parties, using RSA public key encryption (named after the authors of...