|
You are here |
paragonie.com | ||
| | | | |
sergioprado.blog
|
|
| | | | | This article is going to be an introduction to embedded Linux security. | |
| | | | |
soatok.blog
|
|
| | | | | Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the... | |
| | | | |
ankane.org
|
|
| | | | | It feels like data breaches are showing up every week in the news. If you haven't taken a second look at how you're storing sensitive data, now is... | |
| | | | |
blog.martinig.ch
|
|
| | | Informations and opinions about software architecture, developers on call, holacracy, Scrum, continuous testing, product management, saying thank you, tech leadership, customer journey maps, code reviews, code sharing, good bugs, android testing and open source project management. | ||