kybernetikos + encryption   11

The Hunting of the SNARK – QED-it
We are very excited to present to you The Hunting of the SNARK, a treasure hunt consisting of cryptographic challenges that will guide you through a zero-knowledge proof (ZKP) learning experience.
crypto  development  encryption  cryptocurrency  IFTTT  knowledge  proof  security 
july 2017 by kybernetikos
A very casual introduction to Fully Homomorphic Encryption – A Few Thoughts on Cryptographic Engineering
Encrypting a document isn’t the same as putting it into a physical lockbox. And this is a good thing! Because in fact, there is a kind of encryption that allows us to bypass some of these limitations. We refer to this as homomorphic encryption, and its defining characteristic is this: you can perform useful operations on encrypted values without decrypting them first.
crypto  encryption  math  programming  homomorphic 
january 2017 by kybernetikos
vox.SPACE: Being privacy-aware in 2016
As more and more people are living a digital life inside their computers, discussions about privacy and whether or not we can expect to be protected from intrusions in our private lives are taking over the Internet. Regardless of your thoughts on the subject, if you are just a concerned citizen or the newest whistle-blower, there are some ways you can protect your privacy while browsing the Internet or visiting a new country. This is not an exhaustive list, it's just a compilation of useful information I gathered.
encryption  privacy  security 
june 2016 by kybernetikos
node-scrypt-js is a pure javascript implementation of the scrypt encryption utility.
scrypt  javascript  encryption 
november 2013 by kybernetikos
ROSEdu Techblog - From 0 to cryptography
This guide is designed to explain why you need to hide information and how can you do this when you do not trust the channel through which messages are conveyed. We will discuss about cryptographic system, encryption, decryption, one-way function, asymmetric keys and more. You may think of cryptography as the thing that keeps you untouchable inside of a soap bubble travelling by air around the world.
crypto  tutorial  security  cryptography  encryption  paint  diffe  helman  key  exchange  dhe 
september 2012 by kybernetikos
Alice and Bob in Cipherspace » American Scientist
Fully Homomorphic Encryption allows computation on encrypted data.
encryption  privacy  cloud  homomorphic  computation  fhe 
september 2012 by kybernetikos
Educational Tool for Cryptography and Cryptanalysis
cryptography  tools  security  tutorial  opensource  crypto  encryption 
june 2009 by kybernetikos
Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
encryption  cryptography  tools  _geekinstall 
april 2008 by kybernetikos
Tiger Envelopes
Easy mail crypto? Amazing. Also, I like p2p key distribution. Update: Messed up my system - not ready for wide use yet
email  encryption  security 
september 2006 by kybernetikos

Copy this bookmark: