|
You are here |
neilmadden.blog | ||
| | | | |
kel.bz
|
|
| | | | | [AI summary] A technical analysis of RSA-based Key Encapsulation Mechanisms, highlighting vulnerabilities in unpadded RSA and explaining the secure alternative known as RSA-KEM with OAEP. | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
paragonie.com
|
|
| | | | | A human-readable overview of commonly misused cryptography terms and fundamental concepts. | |
| | | | |
www.micah.soy
|
|
| | | A storytelling approach in the style of Blade Runner for introducing cryptography concepts. | ||