wiby  
Settings



Links

https://triptico.com/links/

cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth

Some publications

https://members.loria.fr/PZimmermann/papers/

and Breaking Public-Key Cryptography , with Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, IEEE Security and Privacy, volume 20, number 2, page

PuTTY FAQ

https://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html

as part of the SSH cryptography. This is stored by default in a file called PUTTY.RND ; this is stored by default in the ‘Application Data’ directory, or failing that,

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

NLnet; Current projects

https://nlnet.nl/project/current.html

Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec. Ad-Blocker An Overview of Ad-Blocking Technology - Basically explains how an Ad-B
All your base are belong to us!

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves)

CipherSaber Home Page

https://ciphersaber.gurus.org/

use it. And even if all cryptography information was removed from the Internet and from bookstores and from public libraries, the terrorist organizations who sent men to Florida t
Fight the crypto ban by learning how to write your own strong encryption program.

SmartFilter - I've Got A Little List

http://sethf.com/anticensorware/smartfilter/gotalist.php

- "Cryptography, cryptanalysis, and related issues. (Moderated)" blacklisted Criminal Skills news:soc.bi - "Discussions of bisexuality." blacklisted Sex Relate
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study

Greg A. Woods

http://www.weird.com/~woods/

Stuff Only Strong Cryptography Will Stop SPAM Recently the IETF reluctantly published some RFCs describing a couple of ways that some sadly ignorant (and/or horribly pessimistic)


Find more...