wiby  
Settings



Links

https://triptico.com/links/

cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth

Networking in the Mind Age - future of distributed intelligence

http://www.ethologic.com/sasha/mindage.html

servers, public key cryptography, collaborative information filtering schemes, message authentication algorithms, computational economies, computerized banking and other network c
Essay on long-term future of intelligent distributed systems. Discussed topics include post-identity intelligent architectures, transhumanist philosophy

Amicus Brief

https://archive.epic.org/crypto/export_controls/bernstein_brief.html

a cutting-edge cryptographyindustry in the United States is important for national security andeconomic reasons and that electronic commerce, the Internet, andother advanced commu

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

Thomas Homer-Dixon As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we

Some publications

https://members.loria.fr/PZimmermann/papers/

and Breaking Public-Key Cryptography , with Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, IEEE Security and Privacy, volume 20, number 2, page

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

5 January 2022 The Cryptography of Orphan Annie and Captain Midnight Badges? We don't need no badges! Between 1935 and 1949, many North American children (and adults) got their in

The computer built to last 50 years

https://ploum.net/the-computer-built-to-last-50-years/

implies strong cryptography. Private information should be encrypted with no other metadata than the recipient. The computer connecting to you have no idea if you are the original
The computer built to last 50 years par Ploum - Lionel Dricot.

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

NLnet; Current projects

https://nlnet.nl/project/current.html

Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t

The Power of Centralization

https://secushare.org/centralization

provided through cryptography. First, the fact that is has become common practice to provide a web browser rather than a distributed social network merely stems from a historical

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves)

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

Mohit Agarwal - Home Cryptography, crime, terror, and surveillance See this document as a pdf References Mohit Agarwal March 2022 Modern encryption methods permit a level of priva


Find more...