Well done! You've reached the end of my post. Now you can leave a comment or read something else.
Here are some random popular articles:
- - Database Encryption
- - Proof of Elgamal's semantic security using a reduction to DDH
- - QUIC Crypto and simple state machines
- - What are x509 certificates? RFC? ASN.1? DER?
- - Developers Are Not Idiots
- - ASN.1 vs DER vs PEM vs x509 vs PKCS#7 vs ....
- - How to Backdoor Diffie-Hellman: quick explanation
Here are some random recent articles:
- - Authentication, What The Fuck?
- - My book Real World Cryptography is out in pre-access
- - User authentication with passwords, What’s SRP?
- - Hardware Solutions To Highly-Adversarial Environments Part 1: Whitebox Crypto vs Smart Cards vs Secure Elements vs Host-Card Emulation (HCE)
- - Why 2f+1
- - Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
- - Messaging Layer Security: A Few Thoughts
Comments
leave a comment...