|
You are here |
blog.nuculabs.de | ||
| | | | |
keymaterial.net
|
|
| | | | | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key... | |
| | | | |
thomasbandt.com
|
|
| | | | | Analyzing quantum computing's impact on cryptography, this post briefly discusses challenges in encryption and advances in post-quantum cryptography, emphasizing the race for quantum-resistant security. | |
| | | | |
nuculabs.wordpress.com
|
|
| | | | | This is my first book review that I did my blog, I'm not really good at reviewing books and I'm not a native english speaker either, so bear with me and my clumsy english. I must also say that the subject covered by the book overwhelms me, I don't claim to be an expert on... | |
| | | | |
www.mcafee.com
|
|
| | | A major vulnerability affecting the security of cloud services dubbed POODLE was reported on October 14th by three Google security researchers. | ||