Active
Recent
Comments
Search
Login
Login
soatok.blog: 25 stories from 9 submitters
16
A Plan for Multicast Support in Noise-based Protocols
cryptography
networking
soatok.blog
authored by
soatok
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
11
Asymmetric Cryptographic Commitments
cryptography
soatok.blog
authored by
soatok
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
52
Database Cryptography Fur the Rest of Us
cryptography
databases
security
soatok.blog
authored by
soatok
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
95
How You Respond to Security Researchers Says Everything About You
cryptography
security
soatok.blog
authored by
soatok
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
34
What We Do in the /etc/shadow – Cryptography with Passwords
cryptography
security
soatok.blog
authored by
soatok
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
23
Extending the AES-GCM Nonce Without Nightmare Fuel
cryptography
soatok.blog
authored by
soatok
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
61
Towards End-to-End Encryption for Direct Messages in the Fediverse
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
39 comments
39
39
Cryptographic Agility and Superior Alternatives
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
38
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
51
Using RSA Securely in 2022
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
38
The Controversy Surrounding Hybrid Cryptography
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
22
Understanding HKDF
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
140
Threema: Three Strikes, You’re Out
cryptography
mobile
privacy
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
21 comments
21
65
Programmers Don’t Understand Hash Functions
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
41 comments
41
91
Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
23
Canonicalization Attacks Against MACs and Signatures
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
24
Why Furries Make Excellent Hackers
culture
soatok.blog
via
cadey
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
7
Dead Ends in Cryptanalysis #2: Timing Side-Channels
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
29
Understanding Extended-Nonce Constructions
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
43
No Gates, No Keepers
culture
rant
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
53 comments
53
82
Cryptography Interface Design is a Security Concern
api
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
105
Crackpot Cryptography and Security Theater
cryptography
science
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
27 comments
27
97
Please Stop Encrypting with RSA Directly
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
20 comments
20
14
Block Cipher Structures Ranked
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
20
Cryptographic Wear-Out for Symmetric Encryption
cryptography
math
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
Page 2 >>