Explore >> Select a destination


You are here

paragonie.com
| | scottarc.blog
2.7 parsecs away

Travel
| | This isn't (necessarily) a security vulnerability; merely an observation that I don't think has been articulated adequately within the cryptography community. I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems. Background Once upon a time, there was Symmetric Encryption, which provided confidentiality, but...
| | soatok.blog
2.9 parsecs away

Travel
| | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment...
| | www.zend.com
2.9 parsecs away

Travel
| | Libsodium is a modern cryptography library. Learn how you can use the Libsodium cryptography library for PHP encryption.
| | paragonie.com
18.5 parsecs away

Travel
| A brief overview of the various common use-cases of asymmetric cryptography (also known as "public-key cryptography") from the perspective of a software developer.