|
You are here |
www.elopezr.com | ||
| | | | |
www.trailofbits.com
|
|
| | | | | [AI summary] The text discusses various cryptographic constructions and their vulnerabilities. It highlights the importance of using established cryptographic primitives like HMAC, KMAC, and modern password-based key derivation functions (PBKDFs) instead of ad-hoc solutions. Key points include the risks of ambiguous encoding in MAC and hash functions, length-extension attacks, and the need for memory-hard KDFs to resist brute-force attacks. The text also touches on the broader implications of cryptographic design, emphasizing the necessity of rigorous standards and avoiding simplistic approaches that can lead to significant security weaknesses. | |
| | | | |
imranontech.com
|
|
| | | | | On occasion you meet a developer who seems like a solid programmer. They know their theory, they know their language. They can have a reasonable conversation about programming. But once it comes down to actually producing code they just don't seem to be able to do it well. You would probably think they're a good... | |
| | | | |
blog.rfox.eu
|
|
| | | | | Patterns and structures of current operating systems and some thoughts about how that could be improved, with lessons learnt from Self, Smalltalk and other "e;structured"e; systems. | |
| | | | |
stefansf.de
|
|
| | | In this article we examine the strict aliasing rules of the C programming language which are the basis for Type-Based Alias Analysis and show some quirks | ||