Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
soatok
.
93
How You Respond to Security Researchers Says Everything About You
cryptography
security
soatok.blog
authored by
soatok
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
27 comments
27
34
What We Do in the /etc/shadow – Cryptography with Passwords
cryptography
security
soatok.blog
authored by
soatok
28 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
22
Extending the AES-GCM Nonce Without Nightmare Fuel
cryptography
soatok.blog
authored by
soatok
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
61
Towards End-to-End Encryption for Direct Messages in the Fediverse
cryptography
security
soatok.blog
authored by
soatok
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
39 comments
39
8
Ed25519 Deep Dive Addendum
cryptography
cendyne.dev
via
soatok
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
Cryptographic Agility and Superior Alternatives
cryptography
soatok.blog
authored by
soatok
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
19
How Google played with bad cryptography
cryptography
security
cendyne.dev
via
soatok
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
38
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
cryptography
soatok.blog
authored by
soatok
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
16
A Deep dive into Ed25519 Signatures
cryptography
cendyne.dev
via
soatok
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
51
Using RSA Securely in 2022
cryptography
security
soatok.blog
authored by
soatok
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
38
The Controversy Surrounding Hybrid Cryptography
cryptography
soatok.blog
authored by
soatok
12 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
22
Understanding HKDF
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
140
Threema: Three Strikes, You’re Out
cryptography
mobile
privacy
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
21 comments
21
65
Programmers Don’t Understand Hash Functions
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
41 comments
41
91
Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
23
Canonicalization Attacks Against MACs and Signatures
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
48
Cryptanalysis of Meow Hash
cryptography
peter.website
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
3
Cupcake (Form Generation and Processing Library for PHP 8)
show
php
github.com
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
7
Dead Ends in Cryptanalysis #2: Timing Side-Channels
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
29
Understanding Extended-Nonce Constructions
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
43
No Gates, No Keepers
culture
rant
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
53 comments
53
5
Adventures with RSA Blind Signing
cryptography
cathieyun.medium.com
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
82
Cryptography Interface Design is a Security Concern
api
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
105
Crackpot Cryptography and Security Theater
cryptography
science
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
27 comments
27
3
Hybrid encryption and the KEM/DEM paradigm
cryptography
security
neilmadden.blog
via
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>