Hacker News
- Best Practices for Key Derivation https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/ 0 comments
Lobsters
- Best practices for key derivation https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/ 9 comments cryptography
Linked pages
- Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research https://security.apple.com/blog/imessage-pq3/ 345 comments
- Signal >> Specifications >> The PQXDH Key Agreement Protocol https://signal.org/docs/specifications/pqxdh/ 223 comments
- “YOLO” is not a valid hash construction | Trail of Bits Blog https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/ 88 comments
- RFC 9106: Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications https://www.rfc-editor.org/rfc/rfc9106.html 40 comments
- The Noise Protocol Framework http://noiseprotocol.org/noise.html 20 comments
- Hashing Apples, Bananas and Cherries | Pascal Junod https://crypto.junod.info/posts/recursive-hash/ 10 comments
- Flickr's API Signature Forgery Vulnerability http://vnhacker.blogspot.com/2009/09/flickrs-api-signature-forgery.html 6 comments
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol https://eprint.iacr.org/2020/1044 0 comments
- Length extension attack - Wikipedia http://en.wikipedia.org/wiki/Length_extension_attack 0 comments
- Harvest now, decrypt later - Wikipedia https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later 0 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.
Related searches:
Search whole site: site:blog.trailofbits.com
Search title: Best practices for key derivation | Trail of Bits Blog
See how to search.