Shaare your links...
1910 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 1 / 5
98 results for tags cryptography x
  • Read Practical Cryptography With Go | Leanpub
    Found via a link on https://docs.gitlab.com/ee/user/ssh.html
    Wed Aug 10 11:50:25 2022 - permalink -
    - https://leanpub.com/gocrypto/read#leanpub-auto-chapter-1-introduction
    book cryptography Go
  • GNU Privacy Guard is very powerful software with a terrible interface.
    This document attempts to give you the tools needed to answer questions and explain the mysteries of gpg and PGP so that you too can take advantage of this tool and stop making excuses.
    Found on https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    See also https://github.com/dmshaw/paperkey and https://github.com/jonathancross/jc-docs
    Fri Jul 1 11:31:54 2022 - permalink -
    - https://gpg.wtf/
    cryptography GNU gpg reading security TODO
  • A Visual Explanation of GPG Subkeys - Richard Goulter's Blog
    Found via https://rgoulter.com/blog/posts/programming/2020-08-22-early-impressions-of-bm40rgb-ortholinear-keyboard.html
    See also
    https://rgoulter.com/blog/posts/programming/2022-02-20-using-home-manager-to-manage-symlinks-to-dotfiles.html
    https://rgoulter.com/blog/posts/programming/2014-04-26-online-resources-for-git.html
    and probably more.
    Mon Jun 27 11:17:05 2022 - permalink -
    - https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    blog cryptography gpg security
  • Algorand: A Better Distributed Ledger, with Silvio Micali
    Found on http://www.pfarrell.com/
    Sun Jun 19 22:57:11 2022 - permalink -
    - https://m.youtube.com/watch?v=_nQE_HAGlmM
    cryptography reading TODO
  • Real-World Cryptography
    Found on https://crypto.stackexchange.com/questions/71053/soft-question-what-are-examples-of-beautiful-proofs-in-cryptography?
    Tue Jun 7 17:24:27 2022 - permalink -
    - https://www.manning.com/books/real-world-cryptography
    book cryptography
  • Encrypting sensitive and personal data
    Available for Linux, OS X and Windows. More details can be found on https://www.primx.eu/en/encryption-software/zed-en/
    ALGORITHMS: AES (128 to 256 bits) and RSA (1024 to 4096 bits).
    TECHNOLOGIES: PKCS#1, PKCS#5, PKCS#11, X509, Microsoft CSP, LDAP technologies, PKIx compatible.
     PKCS#1 RSA Cryptography Standard https://en.wikipedia.org/wiki/PKCS_1
     PKCS#5 Password-based Encryption Standard https://en.wikipedia.org/wiki/PBKDF2
     PKCS#11 Cryptographic Token Interface https://en.wikipedia.org/wiki/PKCS_11
     X509 https://en.wikipedia.org/wiki/X.509 (ITU) standard defining the format of public key certificates.
     Does CSP stand for https://en.wikipedia.org/wiki/Credential_service_provider , Cloud service provide https://mymatetech.net/what-is-microsoft-csp-ab5b80519e79 or something else?
     LDAP https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
     Does PKIx stand for https://en.wikipedia.org/wiki/X.509#PKIX_Working_Group ?

    SYSTEMS: Available for Windows 11 to Windows 7, Linux (various distributions) and Mac OS.
    LANGUAGES: Available in 7 languages.
    ZED! mobile app for iOS and Android.
    Wed Apr 6 17:01:32 2022 - permalink -
    - https://www.zedencrypt.com/
    cryptography security TODO
  • Lightweight Cryptography | CSRC
    List of the ten Finalists of the lightweight crypto standardization process.
    Mon Mar 28 18:17:36 2022 - permalink -
    - https://csrc.nist.gov/Projects/lightweight-cryptography/finalists
    algorithm cryptography hardware software
  • GitHub - seemoo-lab/fido2ext: Bring Your Own FIDO2 Extensions!
    This repository documents how to implement custom FIDO2 extensions. It contains supplementary material to our paper at ETAA 2021. We describe how to implement extensions on all parts of the FIDO2 stack: On the relying party (website), on the client (browser), and on the authenticator (hardware token).

    Found via https://positive.security/blog/find-you and https://github.com/seemoo-lab/openhaystack
    Tue Mar 15 13:40:16 2022 - permalink -
    - https://github.com/seemoo-lab/fido2ext
    cryptography FIDO security software
  • Time-based One-time Password (TOTP) - MELPA
    Create TOTP using gnutls for crypto and auth source for secure storage of shared secret.
    Emacs 27.1 is required for bignum support.
    Found on Sacha Chua's blog https://sachachua.com/blog/2021/10/2021-10-18-emacs-news/
    Tue Oct 19 09:50:40 2021 - permalink -
    - https://melpa.org/#/totp
    cryptography emacs
  • A few comments on ‘age’ – Neil Madden
    Critical review of some of the design choices made in the cryptographic tool 'age'.
    There are other interesting articles, such as the three-part series
    https://neilmadden.blog/2018/11/14/public-key-authenticated-encryption-and-why-you-want-it-part-i/
    https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/
    https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/
    and
    https://neilmadden.blog/2016/09/13/critical-thinking-for-software-engineers
    Tue Oct 12 18:09:43 2021 - permalink -
    - https://neilmadden.blog/2019/12/30/a-few-comments-on-age/
    blog cryptography reading security TODO
  • Exploring age v 1.0 | Prevent Default
    Introduction to age, a “simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.”
    The source code can be found at https://github.com/FiloSottile/age and the german Wikipedia has an entry https://de.wikipedia.org/wiki/Actually_Good_Encryption
    Tue Oct 12 16:57:17 2021 - permalink -
    - https://sts10.github.io/2021/09/06/exploring-age-1-point-0.html
    cryptography Go Rust software
  • Serious Cryptography | No Starch Press
    Looks interesting. While not brand new (2017-11), it is more up-to-date than the HAC (5th printing 2001).
    Mon Oct 11 11:31:56 2021 - permalink -
    - https://nostarch.com/seriouscrypto
    book cryptography
  • SHA-1 is a Shambles
    Chosen-prefix collisions for SHA-1. Note that this can affect GPG 1.4.
    Found via https://fossil-scm.org/home/doc/trunk/www/fossil-v-git.wiki
    Mon Sep 13 11:47:05 2021 - permalink -
    - https://sha-mbles.github.io/
    cryptography gpg security SHA
  • saltpack - a modern crypto messaging format
    Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate. We've made few crypto decisions and instead leave almost all of the heavy lifting to the NaCl library.

    saltpack is a binary message format, encoded using the MessagePack format. Messages are broken up into reasonable (1MB) chunks, over which regular NaCl operations are performed. We have taken pains to address many of the shortcomings of current message formats: (1) only authenticated data is output; (2) repudiable authentication is used wherever possible; (3) chunks cannot be reordered or combined with other transmissions; (4) the public keys of senders and recipients can be hidden; and (5) message truncation is detectable.

    Implementations in Go and Python are available at https://saltpack.org/implementations  The format is used by https://keybase.io/
    Tue Jun 1 22:14:50 2021 - permalink -
    - https://saltpack.org/
    BSD cryptography FOSS security software tool
  • Monocypher is an easy to use crypto library.
    Small. Sloccount counts under 2000 lines of code, small enough to allow audits. The binaries can be under 50KB, small enough for many embedded targets.
    Easy to deploy. Just add monocypher.c and monocypher.h to your project. They compile as C99 or C++ and are dedicated to the public domain (CC0-1.0, alternatively 2-clause BSD).
    Portable. There are no dependencies, not even on libc.
    Honest. The API is small, consistent, and cannot fail on correct input.
    Direct. The abstractions are minimal. A developer with experience in applied cryptography can be productive in minutes.
    Fast. The primitives are fast to begin with, and performance wasn't needlessly sacrificed. Monocypher holds up pretty well against Libsodium, despite being closer in size to TweetNaCl. (More detailed benchmark)
    Mon Apr 19 09:54:52 2021 - permalink -
    - https://monocypher.org/
    C cryptography FOSS software
  • AEZ is an authenticated-encryption (AE) scheme optimized for ease of correct use (“AE made EZ”).
    Found on https://www.metzdowd.com/pipermail/cryptography/2021-April/036859.html
    "The really important thing is the theory paper, https://www.cs.ucdavis.edu/~rogaway/aez/rae.pdf, which is brilliant and anyone who wants to look at block cipher theory should read and understand it."
    Tue Apr 13 13:28:03 2021 - permalink -
    - https://www.cs.ucdavis.edu/~rogaway/aez/index.html
    cryptography reading TODO
  • cppcryptfs is an encrypted overlay filesystem
    cppcryptfs is based on the design of gocryptfs, an encrypted overlay filesystem written in Go.

    cppcryptfs is an implementation of the gocryptfs filesystem in C++ for Windows. cppcryptfs is compatible with gocryptfs. Filesystems created with one can generally be mounted (and synced) with the other.

    Found on https://infosec-handbook.eu/recommendations/ via https://nuetzlich.net/gocryptfs/
    Fri Feb 12 00:12:57 2021 - permalink -
    - https://github.com/bailey27/cppcryptfs
    cryptography security Windows
  • Aaron Toponce
    Blog about cryptography, hash functions and more
    Fri Dec 18 23:02:20 2020 - permalink -
    - https://pthree.org/
    blog cryptography hash Linux number random security
  • Intel(R) Intelligent Storage Acceleration Library
    ISA-L is a collection of optimized low-level functions targeting storage applications. ISA-L includes:
       Erasure codes - Fast block Reed-Solomon type erasure codes for any encode/decode matrix in GF(2^8).
       CRC - Fast implementations of cyclic redundancy check. Six different polynomials supported.
           iscsi32, ieee32, t10dif, ecma64, iso64, jones64.
       Raid - calculate and operate on XOR and P+Q parity found in common RAID implementations.
       Compression - Fast deflate-compatible data compression.
       De-compression - Fast inflate-compatible data compression.
    BSD 3-Clause "New" or "Revised" License.
    According to https://github.com/catid/cm256, ISA-L uses a O(N^3) Gaussian elimination solver for decoding. The CM256 decoder solves the linear system using a fast O(N^2) LDU-decomposition algorithm from "Pivoting and Backward Stability of Fast Algorithms for Solving Cauchy Linear Equations" (T. Boros, T. Kailath, V. Olshevsky), which was hand-optimized for memory accesses.
    See also https://github.com/catid/leopard for a fast O(N log(N)) RS erasure decoder.
    Mon Jun 15 15:26:37 2020 - permalink -
    - https://github.com/intel/isa-l
    BSD coding compression correction CRC cryptography error FOSS
  • .@ Tony Finch's homepage
    Interesting software, such as
    unifdef selectively removes C preprocessor conditionals. My version of this program now shipped by all the BSDs (including Mac OS X) and is used by the Linux kernel build system.
    regpg safely stores server secrets using gpg, so you can keep them in version control.
    picoro - tiny coroutine implementations in pure C. I wrote an accompanying article, coroutines in 20 lines of standard C.
    Counting the days - tiny routines for converting Gregorian dates into linear counts, like Julian day numbers or Unix time_t. The date of the count - a small routine for converting linear day counts into Gregorian dates.
    https://dotat.at/@/2016-04-22-synergy-vs-xmodmap-fight.html Why you can't use xmodmap to change how Synergy handles modifier keys
    His log of links, https://dotat.at/:/ which I found on the TUHS mailing list is also worth reading. He explains a bit about this log on http://dotat.at/.
    Mon Jun 8 22:31:25 2020 - permalink -
    - http://dotat.at/
    blog C compiler cryptography Go key-binding lisp software software TUHS X11
Links per page: 20 50 100
◄Older
page 1 / 5
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.