|
You are here |
dgroshev.com | ||
| | | | |
8yd.no
|
|
| | | | | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n... | |
| | | | |
quantumloom.in
|
|
| | | | | A simple guide to how cryptography keeps your digital stuff safe-from secret codes to secure messages. | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
jeremykun.com
|
|
| | | In this article I'll derive a trick used in FHE called sample extraction. In brief, it allows one to partially convert a ciphertext in the Ring Learning With Errors (RLWE) scheme to the Learning With Errors (LWE) scheme. Here are some other articles I've written about other FHE building blocks, though they are not prerequisites... | ||