Explore >> Select a destination


You are here

soatok.blog
| | neilmadden.blog
9.8 parsecs away

Travel
| | When working with Message Authentication Codes (MACs), you often need to authenticate not just a single string, but multiple fields of data. For example, when creating an authenticated encryption mode by composing a cipher and a MAC (like AES-CBC and HMAC), you need to ensure the MAC covers the IV, associated data, and the ciphertext....
| | blog.heckel.io
11.6 parsecs away

Travel
| | My name is Philipp C. Heckel and this is my tech blog. I mostly write about security, synchronization and scripting in the world of Linux, Java and PHP.
| | notes.volution.ro
7.3 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | www.sebastiansylvan.com
74.7 parsecs away

Travel
|