wiby  
Settings



Links

https://triptico.com/links/

cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth

Loper OS » Engelbart's Violin

http://www.loper-os.org/?p=861

(98) Copyrasty (11) Cryptography (72) Distractions (60) FFA (36) FG (8) FPGA (13) Friends (79) FritzChip (1) Gentoo (7) Hardware (63) Hot Air (67) Idea (20) Lisp (35) LispMachine

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

NLnet; Current projects

https://nlnet.nl/project/current.html

Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t

The Power of Centralization

https://secushare.org/centralization

provided through cryptography. First, the fact that is has become common practice to provide a web browser rather than a distributed social network merely stems from a historical

CipherSaber Home Page

https://ciphersaber.gurus.org/

use it. And even if all cryptography information was removed from the Internet and from bookstores and from public libraries, the terrorist organizations who sent men to Florida t
Fight the crypto ban by learning how to write your own strong encryption program.

Greg A. Woods

http://www.weird.com/~woods/

Stuff Only Strong Cryptography Will Stop SPAM Recently the IETF reluctantly published some RFCs describing a couple of ways that some sadly ignorant (and/or horribly pessimistic)

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

to Elliptic Curve Cryptography (March 8, 2006) SQL injection attacks (March 24, 2006) Cross-site scripting attacks (April 12, 2006) A flurry of kernel security fixes (April 26, 20


Find more...