rsa   2249

« earlier    

crocs-muni/roca: ROCA: Infineon RSA key vulnerability
ROCA: Infineon RSA key vulnerability. Contribute to crocs-muni/roca development by creating an account on GitHub.
security  hacking  rsa  pki  exploit  attack  crypto 
9 days ago by vrobin
Customers Blame Companies not Hackers for Data Breaches
...over half (57%) of consumers blame companies ahead of hackers if their data is stolen. Consumer backlash in response to the numerous high-profile data breaches in recent years has exposed one of the hidden risks of digital transformation: loss of customer trust.
data  breach  hackers  rsa 
6 weeks ago by SecurityFeed
RT : Computing GCD (Greatest Common Divisor) between 36 trillion pairs of keys should have taken years, but a team…
RSA  from twitter
9 weeks ago by jace
Mathematicians Seal Back Door to Breaking RSA Encryption | Quanta Magazine
Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work.
Cryptography  HEALTH  abstractions  cambridge  computer  crypto  encryption  equations  factoring  factors  math  mathematics  maths  notes  number  numbers  of  polynomial  prime  rsa  science  security  theory  university 
10 weeks ago by xer0x
Converting SSH and PuTTY keys to the OpenSSH format
A simple command for converting an SSH2/PuTTY public key into an OpenSSH public key, ready for use for git and authorized_keys.
ssh  security  rsa  openssl 
december 2018 by andreaskoch

« earlier    

related tags

#app  /r/talesfromtechsupport  2011  512-bit  abstractions  adultcommissioning  algorithm  algorithms  animation  anxiety  asymmetrical  attack  attacks  auth  authentication  backdoor  benefits  blind  blog  bloom  bornglobal  breach  bruce  bsafe  bullshitjobs  by  calculator  cambridge  care  carpeltunnel  cathy  ccc  celta  certificate  ch1  ch16  chainshot  change  ciphers  coinjacking  comparison  compromise  computer  con  conference  config  converter  cracking  create  criptografía  cryptanalysis  crypto  cryptography  cryptopals  ctefla  ctf  cybersecurity  data  dc:creator=graeberdavid  dctagged  development  dhe  difference  diffie-hellman  dsa  dzone  ecc  ecdsa  economy  ed25519  empathy  employment  encoding  encrypted  encryption  equations  error  esb6  example  exploit  factoring  factors  fail  filter  firewall  found  gartner  gnupg  gobblynne  golang  gpg  guide  hack  hackers  hacking  hardare  hardware  health  howto  ics  id  id_rsa  identity  industrialstrategy  infineon  inflation  information  insecurity  internationalentrepreneurship  ios  java  javascript  jisc  jobquality  jobs  jwt  kayato  key  keygen  keylength  keys  kryptographie  labour  latacora  latecapitalism  lawyer  linux  lists  livingstandards  lockheedmartin  malware  matasano  math  mathematics  maths  money  multi  multiple  new  notes  nsa  number  numbers  o'neil  of  one-sidedflex  online  openpgp  openssh  openssl  padding  pain  papers  password  pay  pdf  pem  permissions  pgp  pir  pki  polynomial  precarity  presentation  prime  primes  print  privacy  private  programming  ptacek  pub  public  putty  puttygen  python  reddit  reference  replacement_certificate  report  research  restapinotes  retrieval  risk  risks  robot  roca  savings  scep  schneier  science  sec  secureid  securid  security  self  servers  sidechannel  signature  signed  software  ssh-2  ssh  ssl  stackexchange  story  structure  technologist  theory  thinktank  tls  todo  token  tolearn  toread  totry  tounderstand  tpm  tutorial  twofactor  ubi  uk  ulnarnerve  universalbasicincome  university  update  vectors  video  vpn  vulnerability  wages  welfare  work  x509  yubikey  zerohours 

Copy this bookmark: