Linking pages
- I want XAES-256-GCM/11 https://words.filippo.io/dispatches/xaes-256-gcm-11/ 115 comments
- Phil Does Security | Collision Finding The Maxwell Way https://pdaian.com/blog/collision-finding-the-maxwell-way/ 113 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- 128 Bits of Security and 128 Bits of Security: Know the Difference http://loup-vaillant.fr/tutorials/128-bits-of-security 84 comments
- XAES-256-GCM https://words.filippo.io/dispatches/xaes-256-gcm/ 67 comments
- Research Notes: AES-GMAC-CTR (SIV) – ZeroTier https://www.zerotier.com/aes-gmac-ctr-siv/ 59 comments
- GitHub - aegistudio/enigma: 🔢🔒Enigma: a simple cross-platform encrypted filesystem https://github.com/aegistudio/enigma 39 comments
- t1ha = Fast Positive Hash / Habr https://habr.com/en/post/439156/ 18 comments
- JWTs: Which Signing Algorithm Should I Use? https://www.scottbrady91.com/jose/jwts-which-signing-algorithm-should-i-use 7 comments
- Using Perforce in a Complex Jenkins Pipeline | Riot Games Technology https://engineering.riotgames.com/news/using-perforce-complex-jenkins-pipeline 6 comments
- The Long Key ID Collider https://nullprogram.com/blog/2019/07/22/ 2 comments
- HTTPS and OpenVPN face new attack that can decrypt secret cookies | Ars Technica http://arstechnica.com/security/2016/08/new-attack-can-pluck-secrets-from-1-of-https-traffic-affects-top-sites/ 1 comment
- Cute Cryptography Stories https://www.cryptologie.net/article/506/cute-cryptography-stories/ 1 comment
- Generating .onion names for Tor hidden services - Tinkering with the WebCrypto API https://timtaubert.de/blog/2014/11/using-the-webcrypto-api-to-generate-onion-names-for-tor-hidden-services/ 1 comment
- SNARK Security and Performance - a16z crypto https://a16zcrypto.com/snark-security-and-performance/ 0 comments
- GitHub - pFarb/awesome-crypto-papers: A curated list of cryptography papers, articles, tutorials and howtos. https://github.com/pFarb/awesome-crypto-papers 0 comments
- Estimating the Bit Security of Pairing-Friendly Curves – NCC Group Research https://research.nccgroup.com/2022/02/03/estimating-the-bit-security-of-pairing-friendly-curves/ 0 comments
- Collision probability and birthday paradox. | by U. Rinat | Engineer’s Notes https://blog.rinatussenov.com/collision-probability-and-birthday-paradox-ef98b84fe009#.rei1t3k0x 0 comments
- The birthday paradox puzzle: tidy simulation in R – Variance Explained http://varianceexplained.org/r/birthday-problem/ 0 comments
- It's My Birthday Too, Yeah - The New York Times http://opinionator.blogs.nytimes.com/2012/10/01/its-my-birthday-too-yeah/ 0 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Birthday attack - Wikipedia
See how to search.