Hacker News
- Kerckhoffs's principle http://en.wikipedia.org/wiki/Kerckhoffs%27s_principle 17 comments
- Kerckhoffs's principle http://en.wikipedia.org/wiki/Kerckhoffs%27s_principle 2 comments
- Does a one time pad expose itself as a one time pad? https://en.m.wikipedia.org/wiki/Kerckhoffs%27s_principle 35 comments crypto
Linking pages
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- How to Hide Secrets in Strings— Modern Text hiding in JavaScript | by Mohan Sundar | Bits and Pieces https://blog.bitsrc.io/how-to-hide-secrets-in-strings-modern-text-hiding-in-javascript-613a9faa5787 80 comments
- Open vs. closed source: which wins for security? https://davek.substack.com/p/open-vs-closed-source-which-wins 59 comments
- How to implement password recovery securely in PHP | by Nicolas Far | ITNEXT https://nicolasfar.medium.com/how-to-implement-password-recovery-securely-in-php-db2275ab3560 31 comments
- JavaScript Steganography - Divising the Cloak of Invisibility https://davidwalsh.name/javascript-steganography 11 comments
- How can you tell if a cipher is secure? http://cryptologie.net/article/173/how-can-you-tell-if-a-cipher-is-secure/ 10 comments
- GitHub - gioblu/Cape: String encryption for Arduino, limited microcontrollers and other embedded systems. https://github.com/gioblu/Cape 9 comments
- Too Many Secrets: Proprietary Encryption Protocol Analysis in VStarcam CB73 Security Camera · Brown Fine Security https://brownfinesecurity.com/blog/vstarcam-cb73-proprietary-encryption-analysis/ 9 comments
- Kerckhoffs’s Law for Security Engineers https://devd.me/log/posts/kerckhoffs-law/ 4 comments
- Follow the Bitcoin: Wikileaks. Cryptography and radical transparency… | by Democracy Earth | Hacktivism https://medium.com/crytpo-politics/follow-the-bitcoin-wikileaks-f2218dece347 3 comments
- Terrorism Is Not Effective · Gwern.net http://www.gwern.net/Terrorism%20is%20not%20Effective 2 comments
- Explainer: Dominion vulns reported by Halderman https://cybersect.substack.com/p/explainer-dominion-vulns-reported 2 comments
- How to create your own crappy RSA as a software developer https://www.entropy1729.com/how-to-create-your-own-crappy-rsa-as-a-software-developer/ 1 comment
- The Truth About The Log4J Security Issue. | ITNEXT https://itnext.io/the-truth-about-the-log4j-security-issue-adc7c0f5718d 1 comment
- How to regulate the tech platforms - by Curtis Yarvin https://graymirror.substack.com/p/how-to-regulate-the-tech-platforms 1 comment
- Resource for Journalists: How best to frame your article criticising @ElonMusk for adding #Encryption to @Twitter DMs. Questions to ask, resources to consult. – dropsafe https://alecmuffett.com/article/60757 1 comment
- Day Zero Security — Blog — Evervault https://evervault.com/blog/day-zero-security 0 comments
- I'm working on a data-driven event generation platform for software engineers > Ying Wang https://bytes.yingw787.com/posts/2020/02/08/tinydevcrm_1/ 0 comments
- What is the random oracle model and why should you care? (Part 5) – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2020/01/05/what-is-the-random-oracle-model-and-why-should-you-care-part-5/ 0 comments
- The Truth About The Log4J Security Issue. | ITNEXT https://kevinvr.medium.com/the-truth-about-the-log4j-security-issue-adc7c0f5718d?sk=4c2e658c58870b23d4996668adefdb7e&source=friends_link 0 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Kerckhoffs's principle - Wikipedia
See how to search.