wiby  
Settings



Links

https://triptico.com/links/

cryptography (7) AES-GCM and breaking it on nonce reuse » A good explanation of the arithmetics in AES/GCM (Galois Counter Mode). https://frereit.de/aes_gcm/ Single-primitive auth

Loper OS » Engelbart's Violin

http://www.loper-os.org/?p=861

(98) Copyrasty (11) Cryptography (72) Distractions (60) FFA (36) FG (8) FPGA (13) Friends (79) FritzChip (1) Gentoo (7) Hardware (63) Hot Air (67) Idea (20) Lisp (35) LispMachine

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

NLnet; Current projects

https://nlnet.nl/project/current.html

Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t

The Power of Centralization

https://secushare.org/centralization

provided through cryptography. First, the fact that is has become common practice to provide a web browser rather than a distributed social network merely stems from a historical

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves)

CipherSaber Home Page

https://ciphersaber.gurus.org/

use it. And even if all cryptography information was removed from the Internet and from bookstores and from public libraries, the terrorist organizations who sent men to Florida t
Fight the crypto ban by learning how to write your own strong encryption program.

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

Mohit Agarwal - Home Cryptography, crime, terror, and surveillance See this document as a pdf References Mohit Agarwal March 2022 Modern encryption methods permit a level of priva

how we identify ourselves · Adam Wiggins

https://adamwiggins.com/making-computers-better/identity

failed. Asymmetric key cryptography (where the user has a private key and only shares the public part) is the clear technological solution, but outside of examples like SSL/HTTPS
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

to Elliptic Curve Cryptography (March 8, 2006) SQL injection attacks (March 24, 2006) Cross-site scripting attacks (April 12, 2006) A flurry of kernel security fixes (April 26, 20


Find more...