|
You are here |
paragonie.com | ||
| | | | |
soatok.blog
|
|
| | | | | Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Encryption with Associated Data (AEAD) constructions, understanding what implicit assumptions these systems make about the guarantees of the AEAD mode they chose to build upon, and the... | |
| | | | |
crackstation.net
|
|
| | | | | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly. | |
| | | | |
scottarc.blog
|
|
| | | | | Head's up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly applicable, the scope of the post is not. One of the lessons I learned during my time at AWS Cryptography (and... | |
| | | | |
berty.tech
|
|
| | | Cryptography in one form or other is everywhere online, from banking sites to personal communication apps. But it's not a modern invention. When exactly did it arise? And what developments has it undergone over the years? The history of cryptography runs parallel to the development of new communication methods and safer transactions. Learn more about it to understand just how important it has become. | ||