|
You are here |
www.zend.com | ||
| | | | |
www.jrebel.com
|
|
| | | | | In this blog, we take a look at the Kotlin language, how it's used, how it compares to Java, and how it works with the Android OS. | |
| | | | |
www.vanimpe.eu
|
|
| | | | | Cryptography Introduction Cheatsheet, Private Communications in a Public World | |
| | | | |
paragonie.com
|
|
| | | | | If you're wondering which cryptography library you should use in your project, this should help make the decision easier. | |
| | | | |
www.jeremykun.com
|
|
| | | Last time we saw the Diffie-Hellman key exchange protocol, and discussed the discrete logarithm problem and the related Diffie-Hellman problem, which form the foundation for the security of most protocols that use elliptic curves. Let's continue our journey to investigate some more protocols. Just as a reminder, the Python implementations of these protocols are not at all meant for practical use, but for learning purposes. We provide the code on this blog's Github page, but for the love of security don't actually use them. | ||