Shaare your links...
2353 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 1 / 6
113 results for tags cryptography x
  • https://csrc.nist.gov/csrc/media/presentations/2024/crclub-2024-10-16/images-media/crypto-club-20241016--hugo--OPAQUE.pdf
    The OPAQUE Password Protocol
    Authentication, Secret Retrieval, End-to-end security
    Hugo Krawczyk, AWS
    NIST Seminar – 10.16.2024

    Found after re-reading https://datatracker.ietf.org/doc/html/draft-haase-aucpace-02 where OPAQUE was mentioned as winner of the CFRG password protocol competition.
    See https://cfrg.github.io/draft-irtf-cfrg-opaque/draft-irtf-cfrg-opaque.html
    Tue May 13 13:00:56 2025 - permalink -
    - https://csrc.nist.gov/csrc/media/presentations/2024/crclub-2024-10-16/images-media/crypto-club-20241016--hugo--OPAQUE.pdf
    cryptography security TODO
  • Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
    Interesting book by Paul C. van Oorschot, recommended by Rik Farrow on the TUHS mailing list https://www.tuhs.org/pipermail/tuhs/2025-May/031832.html
    Mon May 5 07:17:33 2025 - permalink -
    - https://people.scs.carleton.ca/~paulv/toolsjewels.html
    book computer cryptography security
  • GitHub repositories of A-Trust
    Tools to inspect certificates, test APIs of A-Trust, the provider of signature services such as "Handysignatur" and "ID Austria".
    Wed Feb 12 08:02:28 2025 - permalink -
    - https://github.com/A-Trust
    cryptography security software tool
  • Using Paper for Everyday Tasks - Xe Iaso
    One of many interesting articles. See https://xeiaso.net/blog/2024/homelab-v2/, https://xeiaso.net/blog/idk-about-email/, https://xeiaso.net/blog/push-2fa-considered-harmful/ for others.
    On https://xeiaso.net/blog/move-away-rsa-ssh/, it is stated that "[it is] likely you can break 2048-bit RSA (the most widely deployed keysize) with a quantum computer that only uses 372 qubits of computational power. The IBM Osprey has 433 qubits."
    https://12factor.net/ sounds interesting too.
    Tue Nov 12 13:18:15 2024 - permalink -
    - https://xeiaso.net/blog/gtd-on-paper-2021-06-13/
    blog cryptography org-mode physics reading
  • AES-GCM and breaking it on nonce reuse | frereit's blog
    Mentioned on Bruce Schneier's blog https://www.schneier.com/blog/archives/2024/06/demo-of-aes-gcm-misuse-problems.html
    Tue Jun 18 15:55:41 2024 - permalink -
    - https://frereit.de/aes_gcm/
    cryptography on-line reading
  • Molly White
    Found on https://en.wikipedia.org/wiki/Substack and https://en.wikipedia.org/wiki/Molly_White_(writer)
    Fri Apr 19 14:51:37 2024 - permalink -
    - https://www.mollywhite.net/
    blog cryptography politics reading
  • Using FIDO2 Auth Keys (Yubikey, Solokeys) with MacOS and FreeBSD // hackacad.net
    Just what it says in the title.
    Tue Feb 20 13:43:01 2024 - permalink -
    - https://hackacad.net/freebsd/2020/03/27/using-fido2-auth-keys-yubikey-solokey-with-macos-and-freebsd.html
    BSD cryptography HOWTO security
  • Enchive : encrypted personal archives, by Chris Wellons (https://nullprogram.com/)
    Enchive is a tool to encrypt files to yourself for long-term archival. It's a focused, simple alternative to more complex solutions such as GnuPG or encrypted filesystems. Enchive has no external dependencies and is trivial to build for local use. Portability is emphasized over performance.

    Supported platforms: Linux, BSD, macOS, Windows

    The name is a portmanteau of "encrypt" and "archive," pronounced en'kīv.

    Files are secured with ChaCha20, Curve25519, and HMAC-SHA256.

    Key pairs can be derived from a pass phrase.  See https://github.com/skeeto/passphrase2pgp for a tool to generate gpg key pairs in a similar way.
    Thu Feb 8 02:14:00 2024 - permalink -
    - https://github.com/skeeto/enchive
    C cryptography FOSS lic:unlicense tool
  • DROPSAFE Security, Privacy, Digital Rights, and Nerdy Parenthood
    Found via a link on the TUHS mailing list to https://alecmuffett.com/article/108789
    See https://alecmuffett.com/article/108139 "Hot on the heels of #ChatControl and in the name of “identity” and “consumer choice” the EU seeks the ability to undetectably spy on HTTPS communication; 300+ experts say “no” to #Article45 of #eIDAS #QWAC"
    Tue Jan 2 12:59:19 2024 - permalink -
    - https://alecmuffett.com
    blog cryptography security TODO
  • Getting started with Google OpenSK
    OpenSK https://github.com/google/OpenSK released by Google is a fully open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.

    OpenSK is based on the FIDO2 specifications, which combine the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) specification and FIDO Alliance’s corresponding Client-to-Authenticator Protocol (CTAP).

    The nRF52840 MDK USB Dongle works well with OpenSK. Taking advantage of the UF2 Bootloader, you can easily program the OpenSK by just copying the .uf2-format image to the flash drive.
    Tue Nov 14 07:41:40 2023 - permalink -
    - https://blog.makerdiary.com/getting-started-with-google-opensk/
    computer cryptography hardware Rust security
  • SPARKNaCl - Two Years of Optimizing Crypto Code in SPARK (and counting)
    Found on https://www.linux.com/audience/developers/hacking-the-linux-kernel-in-ada-part-1/
    Fri Sep 15 13:27:49 2023 - permalink -
    - https://blog.adacore.com/sparknacl-two-years-of-optimizing-crypto-code-in-spark-and-counting
    Ada cryptography language programming
  • Keyoxide
    Verifying online identity with cryptography.
    Found via Nicolas Martyanoff's page https://www.n16f.net/about/
    Tue May 2 14:31:37 2023 - permalink -
    - https://keyoxide.org/
    cryptography FOSS security tool
  • SC4: Secure Communications in a Very Small Code Base
    SC4 is a secure communications system specifically designed for (relatively) easy auditability by way of a ruthless commitment to simplicity. SC4 provides the functional equivalent of PGP from the end-user's point of view, but implements it in two order of magnitude less code. The cryptographic core of SC4 is Daniel J. Bernstein's TweetNaCl library (<800 LOC). On top of this we have a variety of UI implementations ranging from 1000 to 5000 LOC. One of these has completed a formal audit to date.
    Fri Apr 21 17:16:05 2023 - permalink -
    - https://sc4.us/doc/sc4wp.html
    cryptography Garret security software TODO
  • Nicolas Martyanoff — Brain dump
    Interesting blog, includes articles such as
    Using GnuPG https://www.n16f.net/blog/using-gnupg/
    https://www.n16f.net/blog/decluttering-dired-for-peace-of-mind/
    https://www.n16f.net/blog/common-lisp-implementations-in-2023/
    Fri Feb 17 07:26:04 2023 - permalink -
    - https://www.n16f.net/blog
    blog common-lisp cryptography emacs GPG lisp
  • The OpenSSL Project
    OpenSSL software - a robust, commercial-grade, full-featured toolkit for general-purpose cryptography and secure communication.
    Tue Sep 27 07:08:03 2022 - permalink -
    - https://www.openssl.org/
    Apache cryptography software TLS
  • Read Practical Cryptography With Go | Leanpub
    Found via a link on https://docs.gitlab.com/ee/user/ssh.html
    Wed Aug 10 11:50:25 2022 - permalink -
    - https://leanpub.com/gocrypto/read#leanpub-auto-chapter-1-introduction
    book cryptography Go
  • GNU Privacy Guard is very powerful software with a terrible interface.
    This document attempts to give you the tools needed to answer questions and explain the mysteries of gpg and PGP so that you too can take advantage of this tool and stop making excuses.
    Found on https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    See also https://github.com/dmshaw/paperkey and https://github.com/jonathancross/jc-docs
    Fri Jul 1 11:31:54 2022 - permalink -
    - https://gpg.wtf/
    cryptography GNU gpg reading security TODO
  • A Visual Explanation of GPG Subkeys - Richard Goulter's Blog
    Found via https://rgoulter.com/blog/posts/programming/2020-08-22-early-impressions-of-bm40rgb-ortholinear-keyboard.html
    See also
    https://rgoulter.com/blog/posts/programming/2022-02-20-using-home-manager-to-manage-symlinks-to-dotfiles.html
    https://rgoulter.com/blog/posts/programming/2014-04-26-online-resources-for-git.html
    and probably more.
    Mon Jun 27 11:17:05 2022 - permalink -
    - https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    blog cryptography gpg security
  • Algorand: A Better Distributed Ledger, with Silvio Micali
    Found on http://www.pfarrell.com/
    Sun Jun 19 22:57:11 2022 - permalink -
    - https://m.youtube.com/watch?v=_nQE_HAGlmM
    cryptography reading TODO
  • Real-World Cryptography
    Found on https://crypto.stackexchange.com/questions/71053/soft-question-what-are-examples-of-beautiful-proofs-in-cryptography?
    Tue Jun 7 17:24:27 2022 - permalink -
    - https://www.manning.com/books/real-world-cryptography
    book cryptography
Links per page: 20 50 100
◄Older
page 1 / 6
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.