infosec   17288

« earlier    

SafeCurves: Introduction
Secure implementations of the standard curves are theoretically possible but very hard.

Most of these attacks would have been ruled out by better choices of curves that allow simple implementations to be secure implementations. This is the primary motivation for SafeCurves. The SafeCurves criteria are designed to ensure ECC security, not just ECDLP security.
security  infosec  crypto  maths  computers 
32 minutes ago by pozorvlak
Curve Ed448 and Karatsuba multiplication
The elliptic curve Ed448 is nicknamed "Goldilocks" for reasons explained here. It uses an algorithm requiring three multiplications where you'd expect four.
crypto  maths  algorithms  computers  security  infosec 
35 minutes ago by pozorvlak
Cloud security guidance - NCSC
Details and context for the 14 Cloud Security Principles, including their goals and technical implementation
yesterday by prcleary
End user device (EUD) security guidance - NCSC
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution
yesterday by prcleary
ciaranm/securemodelines: A secure alternative to Vim modelines
A secure alternative to Vim modelines. Contribute to ciaranm/securemodelines development by creating an account on GitHub.
vim  modelines  plugin  security  infosec 
3 days ago by po

« earlier    

related tags

2fa  accounta  adversaries  algorithms  amd  analysis  antivirus  apple  article  asus  attack.surface  attack.vectors  attack  automation  avoid  baseline  bash  benchmarks  bigdata  bitcoin  bluekeep  blueteam  book  breaches  bugswweeping  burner_device  burner_phone  cctv  cdc  censorship  cheatsheet  china  chrome  ciberseguridad  cms  comp-sci  computers  containers  counter-intelligence  counterinltelligence  crypto  cryptography  ctf  cybersecurity  data  datasec  datatheft  design  development  devops  dfir  diplomacy  dns  docker  documentation  ecc  electronics  encryption  entropy  exploits  facebook  fail  failboat  footprintinf  forensics  google  googlechrome  googleevil  hacking  hardware  hash  honeypot  howto  identity  in  integrityandconfidentiality  intel  intelligence  internet  iot  journalism  l1tf  leak  linux  malware  marketing  maths  mds  meltdown  memory  mfa  microsoftwindows  mobiles  modelines  needshelp  networking  nsa  openssh  openssl  osint  paper  parenting  passwords  pcap  pentest  pentesting  phishing  phone  phones  plugin  privacy  programming  protocol  rambleed  random  rant  recon  redteam  reference  research  reverse  robgraham  rowhammer  russia  sans  scanner  security  seguridad  shell  sms  software  spectre  spies  spycraft  ssh  ssl  subdomain  surveillance  sysadmin  talks  telegram  testing  threading  threads  tools  toplist  trojan  tscm  tutorial  ui  usa  usability  utility  ux  vectors  vim  vulnerability  watchthis  web  wtf  zombieload 

Copy this bookmark: