wiby  
Settings



Links

https://triptico.com/links/

cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth

Some publications

https://members.loria.fr/PZimmermann/papers/

and Breaking Public-Key Cryptography , with Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, IEEE Security and Privacy, volume 20, number 2, page

PuTTY FAQ

https://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html

as part of the SSH cryptography. This is stored by default in a file called PUTTY.RND ; this is stored by default in the ‘Application Data’ directory, or failing that,

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves)

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Ribeiro Corrêa Cryptography, PGP and Pine , by Matteo Dell'Omodarme Tuxedo Tails , by Eric Kasten Micro Publishing: Part 3 , by Mark Nielsen Virtual fax to pdf files with EF

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

to Elliptic Curve Cryptography (March 8, 2006) SQL injection attacks (March 24, 2006) Cross-site scripting attacks (April 12, 2006) A flurry of kernel security fixes (April 26, 20


Find more...