- What us Elliptic Curve Cryptography and what benefits does it provide over the more widely used RSA encryption? http://en.wikipedia.org/wiki/Elliptic_curve_cryptography 9 comments askscience
Linking pages
- SSL: Intercepted today, decrypted tomorrow | Netcraft News http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html 178 comments
- TLS & Perfect Forward Secrecy http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-secrecy.html 168 comments
- New cloud attack takes full control of virtual machines with little effort | Ars Technica http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/ 126 comments
- rwasa | 2 Ton Digital https://2ton.com.au/rwasa/ 99 comments
- How JavaScript works: cryptography + how to deal with man-in-the-middle (MITM) attacks | SessionStack Blog https://blog.sessionstack.com/how-javascript-works-cryptography-how-to-deal-with-man-in-the-middle-mitm-attacks-bf8fc6be546c?source=collection_home---6------1----------------------- 58 comments
- HTTPS crypto’s days are numbered. Here’s how Google wants to save it | Ars Technica http://arstechnica.com/security/2016/07/https-crypto-is-on-the-brink-of-collapse-google-has-a-plan-to-fix-it/ 53 comments
- Dissecting SSL handshake — Idea of the day http://idea.popcount.org/2012-06-16-dissecting-ssl-handshake/ 45 comments
- GitHub - ofek/bit: Bitcoin made easy. https://github.com/ofek/bit 39 comments
- Subtractable values are torsors http://ro-che.info/articles/2013-01-08-torsors.html 15 comments
- Side-channel attack to modular inversion « Shevek's crypto stuff https://crypto.anarres.info/2017/modular-inversion 14 comments
- Security Principles in iOS Architecture – woumn https://woumn.wordpress.com/2016/05/02/security-principles-in-ios-architecture/ 11 comments
- NSA preps quantum-resistant algorithms to head off crypto-apocalypse | Ars Technica http://arstechnica.com/security/2015/08/nsa-preps-quantum-resistant-algorithms-to-head-off-crypto-apocolypse/ 11 comments
- NSA advisory sparks concern of secret advance ushering in cryptoapocalypse | Ars Technica http://arstechnica.com/security/2015/10/nsa-advisory-sparks-concern-of-secret-advance-ushering-in-cryptoapocalypse/ 6 comments
- Evolution of the SSL and TLS protocols - Red Hat Customer Portal https://access.redhat.com/blogs/766093/posts/2758801 4 comments
- What we learn from computer science about making the best decisions | by Matt Holt | Medium https://medium.com/p/1b5d205db146 3 comments
- Polymorphic Encryption Algorithms — Generating Code Dynamically https://www.pelock.com/articles/polymorphic-encryption-algorithms 2 comments
- Backpack Algorithms And Public-Key Cryptography Made Easy — Smashing Magazine http://coding.smashingmagazine.com/2012/05/17/backpack-algorithms-and-public-key-cryptography-made-easy/ 1 comment
- Introducing Virgil Security. Security. A topic that most software… | by Virgil Security, Inc | Medium https://medium.com/@VirgilSecurity/introducing-virgil-security-216468775529#.g4a0fd9eg 1 comment
- TLS Configuration: Cipher Suites and Protocols | by David B. Templeton | Medium https://medium.com/@davetempleton/tls-configuration-cipher-suites-and-protocols-a01ee7005778 1 comment
- NSA advisory sparks concern of secret advance ushering in cryptoapocalypse | Ars Technica http://arstechnica.co.uk/security/2015/10/nsa-advisory-sparks-concern-of-secret-advance-ushering-in-cryptoapocalypse/ 0 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Elliptic-curve cryptography - Wikipedia
See how to search.