Explore >> Select a destination


You are here

www.clickssl.net
| | www.cesarsotovalero.net
7.0 parsecs away

Travel
| | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet.
| | neilmadden.blog
10.6 parsecs away

Travel
| | Note: this post will probably only really make sense to cryptography geeks. In "When a KEM is notenough", I described how to construct multi-recipient (public key) authenticated encryption. A naïve approach to this is vulnerable to insider forgeries: any recipient can construct a new message (to the same recipients) that appears to come from the...
| | swiftrocks.com
7.1 parsecs away

Travel
| | You do not need to understand the theory of certificates and profiles in order to create a fully working iOS app, but you might be interested in knowing how this process works to make future debugging sessions easier.
| | parsiya.net
71.2 parsecs away

Travel
|