wiby  
Settings



Greg A. Woods

http://www.weird.com/~woods/

Stuff Only Strong Cryptography Will Stop SPAM Recently the IETF reluctantly published some RFCs describing a couple of ways that some sadly ignorant (and/or horribly pessimistic)

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Ribeiro Corrêa Cryptography, PGP and Pine , by Matteo Dell'Omodarme Tuxedo Tails , by Eric Kasten Micro Publishing: Part 3 , by Mark Nielsen Virtual fax to pdf files with EF

Index of Creative Computing articles

https://www.atarimagazines.com/creative/index/

code machine. Basic cryptography: SBOEPN DJQIFST. The trapdoor algorithm; lock up your data with a public key. The apocalypse equations. Where are we headed? A comparison of sorts

Resume -- Chip Morningstar

http://www.fudco.com/chip/resume.html

of Financial Cryptography 2000. A slightly revised version of this paper is available on the web at http://www.erights.org/elib/capability/ode/ode-linear.html . "Distributé

how we identify ourselves · Adam Wiggins

https://adamwiggins.com/making-computers-better/identity

failed. Asymmetric key cryptography (where the user has a private key and only shares the public part) is the clear technological solution, but outside of examples like SSL/HTTPS
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.

/dev/zine

https://zine.dev/

vocal critics, and a cryptography/security nerd who obsesses over making tools that are easy to use and hard to misuse, I thought I would take a stab at the opposite of the above
Sharing and discussing the latest innovations in software development and programming.

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

including API attacks Cryptography – including why quantum crypto security proofs based on entanglement are convincing Security of clinical information systems – inclu


Find more...