Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | www.vanimpe.eu
15.8 parsecs away

Travel
| | Cryptography Introduction Cheatsheet, Private Communications in a Public World
| | notes.volution.ro
14.4 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | soatok.blog
13.1 parsecs away

Travel
| | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...
| | janko.io
77.0 parsecs away

Travel
| Passkeys are a modern alternative to passwords, where the user's device performs the authentication, usually requiring some form of user verification (biometric identification, PIN). Passkeys are built on top of WebAuthn specification, which is based on public-key cryptography. Keypairs are created for each website, and the public key is sent to the server, while the private key is securely stored on the device. This makes passkeys: