Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
soatok
.
18
A path to niche skill-sets and community
culture
cendyne.dev
via
soatok
6 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Asymmetric Cryptographic Commitments
cryptography
soatok.blog
authored by
soatok
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
52
Database Cryptography Fur the Rest of Us
cryptography
databases
security
soatok.blog
authored by
soatok
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
23
What are you doing this week?
☶
ask
programming
authored by
soatok
3 months ago
|
38 comments
38
9
How to use HKDF to derive new keys
cryptography
security
cendyne.dev
via
soatok
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
95
How You Respond to Security Researchers Says Everything About You
cryptography
security
soatok.blog
authored by
soatok
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
34
What We Do in the /etc/shadow – Cryptography with Passwords
cryptography
security
soatok.blog
authored by
soatok
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
23
Extending the AES-GCM Nonce Without Nightmare Fuel
cryptography
soatok.blog
authored by
soatok
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
61
Towards End-to-End Encryption for Direct Messages in the Fediverse
cryptography
security
soatok.blog
authored by
soatok
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
39 comments
39
8
Ed25519 Deep Dive Addendum
cryptography
cendyne.dev
via
soatok
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
Cryptographic Agility and Superior Alternatives
cryptography
soatok.blog
authored by
soatok
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
19
How Google played with bad cryptography
cryptography
security
cendyne.dev
via
soatok
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
38
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
16
A Deep dive into Ed25519 Signatures
cryptography
cendyne.dev
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
51
Using RSA Securely in 2022
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
38
The Controversy Surrounding Hybrid Cryptography
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
22
Understanding HKDF
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
140
Threema: Three Strikes, You’re Out
cryptography
mobile
privacy
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
21 comments
21
65
Programmers Don’t Understand Hash Functions
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
41 comments
41
91
Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
23
Canonicalization Attacks Against MACs and Signatures
cryptography
security
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
48
Cryptanalysis of Meow Hash
cryptography
peter.website
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
3
Cupcake (Form Generation and Processing Library for PHP 8)
show
php
github.com
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
7
Dead Ends in Cryptanalysis #2: Timing Side-Channels
cryptography
soatok.blog
authored by
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
29
Understanding Extended-Nonce Constructions
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
Page 2 >>