You are here |
neilmadden.blog | ||
| | | |
paragonie.com
|
|
| | | | Greatly improve the security of your software by making it automatically apply the latest security updates. | |
| | | |
keymaterial.net
|
|
| | | | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key... | |
| | | |
blog.cryptographyengineering.com
|
|
| | | | This page has some wonky notes about the Secure Remote Password protocol. TL;DR: I don't like it. It's also not obviously broken. But it's inefficient and you should use OPAQUE. Like most PAKE protocols, SRP has two phases. In the sign-up phase, the user registers a "password verifier" with the server. This valueis not actually... | |
| | | |
errorstatistics.com
|
|
| | Professor Andrew Gelman Higgins Professor of Statistics Professor of Political Science Director of the Applied Statistics Center Columbia University (Trying to) clear up a misunderstanding about decision analysis and significance testing Background In our 2019 article, Abandon Statistical Significance, Blake McShane, David Gal, Christian Robert, Jennifer Tackett, and I talk about three scenarios: summarizing... |