Linking pages
- Maybe you shouldn't skip SHA-3 https://www.cryptologie.net/article/400/maybe-dont-skip-sha-3/ 110 comments
- Research Notes: AES-GMAC-CTR (SIV) – ZeroTier https://www.zerotier.com/aes-gmac-ctr-siv/ 59 comments
- Maybe you shouldn't skip SHA-3 https://cryptologie.net/article/400/maybe-you-shouldnt-skip-sha-3/ 49 comments
- Breaking https' AES-GCM (or a part of it) https://www.cryptologie.net/article/361/nonce-disrespecting-adversaries-practical-forgery-attacks-on-gcm-in-tls/ 41 comments
- 64-bit ciphers attack in 75 hours => AES-GCM attack in 75 hours? https://www.cryptologie.net/article/370/64-bit-ciphers-attack-in-75-hours-aes-gcm-attack-in-75-hours/ 31 comments
- GitHub - samuel-lucas6/Cryptography-Guidelines: Guidance on implementing cryptography as a developer. https://github.com/samuel-lucas6/Cryptography-Guidelines 16 comments
- Considerations when using AES-GCM for encrypting files – Stan Ivanov's Blog https://blog.secure-monkey.com/?p=94 7 comments
- GitHub - nonce-disrespect/nonce-disrespect: Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS https://github.com/nonce-disrespect/nonce-disrespect 4 comments
- Ruby + GCM Nonce Reuse: When your language sets you up to fail… - Adam Caudill https://adamcaudill.com/2016/09/19/ruby-gcm-nonce-reuse-language-sets-fail/ 0 comments
- “Forbidden attack” makes dozens of HTTPS Visa sites vulnerable to tampering | Ars Technica http://arstechnica.com/security/2016/05/faulty-https-settings-leave-dozens-of-visa-sites-vulnerable-to-forgery-attacks/ 0 comments