|
You are here |
paragonie.com | ||
| | | | |
scottarc.blog
|
|
| | | | | This isn't (necessarily) a security vulnerability; merely an observation that I don't think has been articulated adequately within the cryptography community. I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems. Background Once upon a time, there was Symmetric Encryption, which provided confidentiality, but... | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
www.zend.com
|
|
| | | | | Libsodium is a modern cryptography library. Learn how you can use the Libsodium cryptography library for PHP encryption. | |
| | | | |
paragonie.com
|
|
| | | A brief overview of the various common use-cases of asymmetric cryptography (also known as "public-key cryptography") from the perspective of a software developer. | ||