|
You are here |
neilmadden.blog | ||
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
artsy.github.io
|
|
| | | | | Encrypting ActiveRecord Fields Without Downtime. May 30,... | |
| | | | |
loup-vaillant.fr
|
|
| | | | | So you want to roll your own crypto. Well, be careful. Be very careful. | |
| | | | |
michaelscodingspot.com
|
|
| | | Michael Shpilt's Blog on .NET software development, C#, performance, debugging, and programming productivity | ||