|
You are here |
scottarc.blog | ||
| | | | |
paragonie.com
|
|
| | | | | How to build a homomorphic encryption scheme that is not vulnerable to chosen-ciphertext attacks, using blockchain-like protocols. | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
paragonie.com
|
|
| | | | | Announcing new versions of the PASETO protocol, which offer better arguments for security in a wider range of use cases. | |
| | | | |
paragonie.com
|
|
| | | Paseto (Platform-Agnostic Security Tokens) is everything JWT should be, but isn't (namely, secure) | ||