|
You are here |
scottarc.blog | ||
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | If you've hung around this blog for a while, you probablyknow how much I like to complain. (Really, quite a lot.) You might even be familiar with one of my favorite complaints:dumb cryptostandards. More specifically:dumb standards promulgated by smart people. The people in question almost always have justifications for whatever earth-shakingly stupid decision they're about... | |
| | | | |
quantumloom.in
|
|
| | | | | A simple guide to how cryptography keeps your digital stuff safe-from secret codes to secure messages. | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
binarydebt.wordpress.com
|
|
| | | A key function of digital singatures is to ensure that the sender of a message is who he claims to be. In this post we will go in a step by step manner and cover the concepts behind digital certificates in simple terms. Consider two people named Alice and Bob sitting in front of their... | ||