Explore >> Select a destination


You are here

durumcrustulum.com
| | neilmadden.blog
2.7 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | soatok.blog
1.2 parsecs away

Travel
| | There is, at the time of this writing, an ongoing debate in the Crypto Research Forum Group (CFRG) at the IETF about KEM combiners. One of the participants, Deirdre Connolly, wrote a blog post titled How to Hold KEMs. The subtitle is refreshingly honest: "A living document on how to juggle these damned things." Deirdre...
| | words.filippo.io
3.5 parsecs away

Travel
| | filippo.io/mlkem768 is a pure-Go implementation of the post-quantum key exchange mechanism ML-KEM-768 optimized for correctness and readability.
| | thatsmaths.com
25.8 parsecs away

Travel
| A digital signature is a mathematical means of verifying that an e-document is authentic, that it has come from the claimed sender and that it has not been tampered with or corrupted during transit. Digital signatures are a standard component of cryptographic systems. They use asymetric cryptography that is based on key pairs, consisting of...