Linkshttps://triptico.com/links/
cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth
Networking in the Mind Age - future of distributed intelligencehttp://www.ethologic.com/sasha/mindage.html
servers, public key cryptography, collaborative information filtering schemes, message authentication algorithms, computational economies, computerized banking and other network c
Essay on long-term future of intelligent distributed systems. Discussed topics include post-identity intelligent architectures, transhumanist philosophy
Amicus Briefhttps://archive.epic.org/crypto/export_controls/bernstein_brief.html
a cutting-edge cryptographyindustry in the United States is important for national security andeconomic reasons and that electronic commerce, the Internet, andother advanced commu
Ian! D. Allen - Personal Home Pagehttp://www.idallen.com/
Thomas Homer-Dixon As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we
Some publicationshttps://members.loria.fr/PZimmermann/papers/
and Breaking Public-Key Cryptography , with Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, IEEE Security and Privacy, volume 20, number 2, page
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
5 January 2022 The Cryptography of Orphan Annie and Captain Midnight Badges? We don't need no badges! Between 1935 and 1949, many North American children (and adults) got their in
The computer built to last 50 yearshttps://ploum.net/the-computer-built-to-last-50-years/
implies strong cryptography. Private information should be encrypted with no other metadata than the recipient. The computer connecting to you have no idea if you are the original
The computer built to last 50 years par Ploum - Lionel Dricot.
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi
NLnet; Current projectshttps://nlnet.nl/project/current.html
Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t
The Power of Centralizationhttps://secushare.org/centralization
provided through cryptography. First, the fact that is has become common practice to provide a web browser rather than a distributed social network merely stems from a historical
https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txthttps://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt
has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves)
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
Mohit Agarwal - Home Cryptography, crime, terror, and surveillance See this document as a pdf References Mohit Agarwal March 2022 Modern encryption methods permit a level of priva
Find more...