cryptography   23965

« earlier    

x.509
public key certificate and electronic signature
ssl  format  cryptography  standard  signature  certificate 
15 hours ago by w17t
the economist
AS EVERY SCHOOLCHILD knows, some sorts of mathematics are harder than others. In the classroom, that is annoying. Outside, it can be useful. For instance, given two prime numbers, however large, multiplying them together to find their product is easy.
quantum  cryptography 
16 hours ago by geetarista
Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually one of the most useful technologies that (almost) never gets used. via Pocket
IFTTT  Pocket  cryptography  encryption  password  security 
22 hours ago by ChristopherA
[1710.08403] Constrained ternary integers
An integer n is said to be ternary if it is composed of three distinct odd primes. In this paper, we asymptotically count the number of ternary integers n≤x with the constituent primes satisfying various constraints. We apply our results to the study of the simplest class of (inverse) cyclotomic polynomials that can have coefficients that are greater than 1 in absolute value, namely to the nth (inverse) cyclotomic polynomials with ternary n. We show, for example, that the corrected Sister Beiter conjecture is true for a fraction ≥0.925 of ternary integers.
number-theory  cryptography  prime-numbers  elliptic-curves  nudge-targets  to-understand 
2 days ago by Vaguery
Security in Offline First Apps – Offline Camp – Medium
At Offline Camp I participated in a session on security of Offline First web apps. We were able to pick out a couple different areas where security would be an issue for Offline First apps. Imagine a…
pouchdb  offline  cryptography 
3 days ago by mac
ECDSA is not that bad: two-party signing without Schnorr or BLS
I already wrote about Schnorr and BLS signatures and I think they are really great. One of the most exciting properties of these signature schemes is key aggregation — if we want to make a 2-of-2 multisignature address we just take our public keys and add them together. via Pocket
IFTTT  Pocket  aggregated  cryptography  ecdsa  encryption 
4 days ago by ChristopherA
bitwarden
Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
password  security  cryptography  opensource 
4 days ago by LaptopHeaven
Why I Don't Recommend Scrypt | ircmaxell's Blog
A blog about PHP, Security, Performance and general web application development.
cryptography  scrypt  password  cypher  hash  storage  development 
4 days ago by vrobin
Cryptology ePrint Archive: Report 2018/962 - Zexe: Enabling Decentralized Private Computation
Interesting use of zcash protocol for arbitrary computation purposes. Might enable a distributed exchange
Zcash  protocol  zero  knowledge  proof  algorithm  cryptography  research  computer  science 
5 days ago by asteroza

« earlier    

related tags

++  1982  2masto  aggregated  algorithm  algorithms  android  app  article  authy  base64  betterexplained  bitcoin  block  blockchain  blogs  book  books  bsd  cartoon  certificate  chain  chat  coding  communication  computation  computer  computer_science  computing  config  courses  crypto  cryptocurrency  csprng  currency  cyberculture  cybersecurity  cypher  cypherpunk  data  decentralization  declassified  design  development  devops  didactic  discussion  distribution  ecdsa  economics  elixxir  elliptic-curves  encryption  engineering  entropy  files  finance  format  future  generator  git  golang  goodwatch  gpg  haha  hardening  hash  hashids  hashing  history  hmac  howto  http  https  hwrng  identity  ifttt  illustration  inbox  intelligence  internet  it-security  java  jiwan  knowledge  learn-with-errors  legal  library  linklist  lobsters  lolbuttcoin  lwe  markets  mathematics  meetup  mpc  network  networking  networks  nisschool  nsa  nudge-targets  number-theory  number  offline  one  openbsd  opensource  openssh  otp  pad  papers  password  pki  pocket  post-quantum  postwar  pouchdb  prime-numbers  privacy  prng  programming  proof  protocol  public-key  puzzle  python  quantum-computing  quantum  quantum_computing  quantumcomputing  radio  randum  readlater  rec:@tqbf  reference  research  rng  rsa  rust  science  scrypt  securitate  security  sharing  siderand  signature  signing  simple  snark  speculation  ssb  ssh  ssl  standard  storage  sweden  swift  sysadmin  tech  technology  theory  time  tls  to-understand  totwitter  tutorial  twilio  unitedstates  uuids  verification  visualization  war  webcomic  wireless  work  xkcd  zcash  zero-knowledge-proofs  zero 

Copy this bookmark:



description:


tags: