- What us Elliptic Curve Cryptography and what benefits does it provide over the more widely used RSA encryption? http://en.wikipedia.org/wiki/Elliptic_curve_cryptography 9 comments askscience
Linking pages
- SSL: Intercepted today, decrypted tomorrow | Netcraft News http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html 178 comments
- TLS & Perfect Forward Secrecy http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-secrecy.html 168 comments
- Transcript of Edward Snowden's comments at IETF93. · GitHub https://gist.github.com/mnot/382aca0b23b6bf082116 139 comments
- New cloud attack takes full control of virtual machines with little effort | Ars Technica http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/ 126 comments
- rwasa | 2 Ton Digital https://2ton.com.au/rwasa/ 99 comments
- How JavaScript works: cryptography + how to deal with man-in-the-middle (MITM) attacks | SessionStack Blog https://blog.sessionstack.com/how-javascript-works-cryptography-how-to-deal-with-man-in-the-middle-mitm-attacks-bf8fc6be546c?source=collection_home---6------1----------------------- 58 comments
- HTTPS crypto’s days are numbered. Here’s how Google wants to save it | Ars Technica http://arstechnica.com/security/2016/07/https-crypto-is-on-the-brink-of-collapse-google-has-a-plan-to-fix-it/ 53 comments
- Dissecting SSL handshake — Idea of the day http://idea.popcount.org/2012-06-16-dissecting-ssl-handshake/ 45 comments
- GitHub - ofek/bit: Bitcoin made easy. https://github.com/ofek/bit 39 comments
- ID card cannot be hacked, UK Government claims - encryption secrets revealed http://www.computerweekly.com/Articles/2009/08/07/237247/id-card-cannot-be-hacked-uk-government-claims-encryption-secrets.htm 31 comments
- Stealthy malware targeting air-gapped PCs leaves no trace of infection | Ars Technica http://arstechnica.com/security/2016/03/stealthy-malware-targeting-air-gapped-pcs-leaves-no-trace-of-infection/ 20 comments
- Subtractable values are torsors http://ro-che.info/articles/2013-01-08-torsors.html 15 comments
- Side-channel attack to modular inversion « Shevek's crypto stuff https://crypto.anarres.info/2017/modular-inversion 14 comments
- Security Principles in iOS Architecture – woumn https://woumn.wordpress.com/2016/05/02/security-principles-in-ios-architecture/ 11 comments
- NSA preps quantum-resistant algorithms to head off crypto-apocalypse | Ars Technica http://arstechnica.com/security/2015/08/nsa-preps-quantum-resistant-algorithms-to-head-off-crypto-apocolypse/ 11 comments
- NSA advisory sparks concern of secret advance ushering in cryptoapocalypse | Ars Technica http://arstechnica.com/security/2015/10/nsa-advisory-sparks-concern-of-secret-advance-ushering-in-cryptoapocalypse/ 6 comments
- Evolution of the SSL and TLS protocols - Red Hat Customer Portal https://access.redhat.com/blogs/766093/posts/2758801 4 comments
- What we learn from computer science about making the best decisions | by Matt Holt | Medium https://medium.com/p/1b5d205db146 3 comments
- Polymorphic Encryption Algorithms — Generating Code Dynamically https://www.pelock.com/articles/polymorphic-encryption-algorithms 2 comments
- The defense of GnuPG - Free Software Association in Turkey https://www.oyd.org.tr/en/articles/defense-of-gpg/ 1 comment
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Elliptic-curve cryptography - Wikipedia
See how to search.