|
You are here |
scottarc.blog | ||
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
paragonie.com
|
|
| | | | | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP | |
| | | | |
martinralbrecht.wordpress.com
|
|
| | | | | Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications.... | |
| | | | |
neilmadden.blog
|
|
| | | Update: I've updated the section on Cryptographic Doom at the end of the article after clarifications from the age author. That specific criticism was based on my misreading of the age spec. Age is a new tool for encrypting files, intended to be a more modern successor to PGP/GPG for file encryption. This is a... | ||