Explore >> Select a destination


You are here

durumcrustulum.com
| | neilmadden.blog
2.7 parsecs away

Travel
| | In my previous post, I described the KEM/DEM paradigm for hybrid encryption. The key encapsulation mechanism is given the recipient's public key and outputs a fresh AES key and an encapsulation of that key that the recipient can decapsulate to recover the AES key. In this post I want to talk about several ways that...
| | soatok.blog
1.2 parsecs away

Travel
| | There is, at the time of this writing, an ongoing debate in the Crypto Research Forum Group (CFRG) at the IETF about KEM combiners. One of the participants, Deirdre Connolly, wrote a blog post titled How to Hold KEMs. The subtitle is refreshingly honest: "A living document on how to juggle these damned things." Deirdre...
| | words.filippo.io
3.6 parsecs away

Travel
| | filippo.io/mlkem768 is a pure-Go implementation of the post-quantum key exchange mechanism ML-KEM-768 optimized for correctness and readability.
| | serokell.io
18.9 parsecs away

Travel
| Quantum computing is a technology that harnesses the principles of quantum mechanics to tackle complex problems that have long puzzled humanity. Check out this post to learn about the potential outcomes of the introduction of quantum computing and its transformative capabilities.