You are here |
pboyd.io | ||
| | | |
notes.volution.ro
|
|
| | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | |
dgroshev.com
|
|
| | | | ||
| | | |
8yd.no
|
|
| | | | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n... | |
| | | |
mathvoices.ams.org
|
|
| | Mathematically, the most intriguing of the new proposals use lattices for message encryption... What will they do when quantum computers start working? Bill Casselman University of British Columbia Commercial transactions on the internet are invariably passed through a process that hides them from unauthorized parties, using RSA public key encryption (named after the authors of... |