Explore >> Select a destination


You are here

scottarc.blog
| | paragonie.com
3.0 parsecs away

Travel
| | How to build a homomorphic encryption scheme that is not vulnerable to chosen-ciphertext attacks, using blockchain-like protocols.
| | soatok.blog
2.0 parsecs away

Travel
| | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment...
| | paragonie.com
2.7 parsecs away

Travel
| | Announcing new versions of the PASETO protocol, which offer better arguments for security in a wider range of use cases.
| | paragonie.com
15.4 parsecs away

Travel
| Paseto (Platform-Agnostic Security Tokens) is everything JWT should be, but isn't (namely, secure)