Explore >> Select a destination


You are here

neilmadden.blog
| | thatsmaths.com
8.3 parsecs away

Travel
| | A digital signature is a mathematical means of verifying that an e-document is authentic, that it has come from the claimed sender and that it has not been tampered with or corrupted during transit. Digital signatures are a standard component of cryptographic systems. They use asymetric cryptography that is based on key pairs, consisting of...
| | keymaterial.net
7.1 parsecs away

Travel
| | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key...
| | blog.cryptographyengineering.com
9.9 parsecs away

Travel
| | This page has some wonky notes about the Secure Remote Password protocol. TL;DR: I don't like it. It's also not obviously broken. But it's inefficient and you should use OPAQUE. Like most PAKE protocols, SRP has two phases. In the sign-up phase, the user registers a "password verifier" with the server. This valueis not actually...
| | www.sonatype.com
46.2 parsecs away

Travel
| Sonatype CTO Brian Fox and Forrester Senior Analyst Janet Worthington discuss securing your organization's software supply chain.