Explore >> Select a destination


You are here

www.imperialviolet.org
| | dadrian.io
50.0 parsecs away

Travel
| | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit...
| | jeremykun.wordpress.com
76.9 parsecs away

Travel
| | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes....
| | neilmadden.blog
76.9 parsecs away

Travel
| | Wikipedia's definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient. -Wikipedia They also have a handy diagram of the process...
| | excited-pixels.com
149.7 parsecs away

Travel
| Matt Burgess at Wired has a good summary article on the current (and always ongoing) debate concerning the availability of strong encryption. In short, he sees three 'classes' of argument which are aimed at preventing individuals from protecting their communications (and their personal information) with robust encryption. Governments or law enforcement agencies are asking for...