overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoKeeping Secretsstanfordmag.orgexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkKeeping Secretsstanfordmag.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoWeb-based cryptography is always snake oilplus-squarewww.devever.netexternal-linkmessage-square4fedilinkarrow-up117arrow-down16
arrow-up111arrow-down1external-linkWeb-based cryptography is always snake oilplus-squarewww.devever.netoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square4fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agoSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agoDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agoThe Fi Virtual Carrier Networkwww.gstatic.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Fi Virtual Carrier Networkwww.gstatic.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agomessage-square1fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 10 months agoAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 10 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.bevideomessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1video17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square1fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.bevideomessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1videoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoInformation Security—Before & After Public-Key Cryptographyplus-squareinvidious.projectsegfau.ltexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInformation Security—Before & After Public-Key Cryptographyplus-squareinvidious.projectsegfau.ltoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoHow Not to Learn Cryptographyesl.cs.brown.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Not to Learn Cryptographyesl.cs.brown.eduoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoTheory and Practice of Cryptographyplus-squarevid.puffyan.usexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTheory and Practice of Cryptographyplus-squarevid.puffyan.usoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoDeciphering Queen Of Scots, Mary Stuart’s Lost Lettersplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkDeciphering Queen Of Scots, Mary Stuart’s Lost Lettersplus-squarehackaday.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoImperialViolet - Cryptographic Agilityplus-squarewww.imperialviolet.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImperialViolet - Cryptographic Agilityplus-squarewww.imperialviolet.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoPollard rho on the playstation 3www.joppebos.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPollard rho on the playstation 3www.joppebos.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoToo Many Keys: Aggregatable Distributed Key Generation – Philipp Jovanovic – Too Much Cryptoplus-squareinvidious.projectsegfau.ltvideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoToo Many Keys: Aggregatable Distributed Key Generation – Philipp Jovanovic – Too Much Cryptoplus-squareinvidious.projectsegfau.ltoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink