|
You are here |
soatok.blog | ||
| | | | |
martinralbrecht.wordpress.com
|
|
| | | | | Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications.... | |
| | | | |
scottarc.blog
|
|
| | | | | Head's up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly applicable, the scope of the post is not. One of the lessons I learned during my time at AWS Cryptography (and... | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure. | |
| | | | |
jonathancarter.org
|
|
| | | |||