« earlier | later » Page 1 of 4
ENIGMA M4 - Breaking German Navy Ciphers edit / delete
Results of the project that was breaking Enigma messages found in a sunken U-Boot.
A Graduate Course in Applied Cryptography edit / delete
Work in progress.
BearSSL - Constant-Time Crypto edit / delete
Or: why constant-time crypto is somewhere between extremely difficult and impossible. (I found this through a discussion of how what it recommends is no longer constant-time on current CPUs.)
to constant-time crypto programming ... on 10 February 2017
netsniff-ng toolkit edit / delete
Various low-level packet tools -- I found this while looking for tunnelling systems based on NaCl.
to crypto ecc nacl networking packet security tunnel ... on 18 October 2016
The Cryptopals Crypto Challenges edit / delete
"We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions. We give you enough info to learn about the underlying crypto concepts yourself." These are really good.
Peter Gutmann's Home Page edit / delete
"My research interests cover the design and analysis of security systems and security usability, including the application of concepts from cognitive psychology to understanding how users interact with security systems, and whatever else happens to catch my interest." Denizen of a variety of security/crypto mailing lists; lots of interesting stuff to read.
to crypto security systems usability usable-security ... on 15 September 2016
WireGuard: fast, modern, secure VPN tunnel edit / delete
VPN protocol based on Noise and straightforward public/private key mappings -- I rather like this design.
to crypto networking noise security vpn ... on 15 September 2016
Cracking the Agrippa Code edit / delete
Reverse-engineering William Gibson's "Agrippa", a poem published on a self-erasing disk.
to crypto mac reverse-engineering william-gibson ... on 27 August 2016
Things that use Ed25519 edit / delete
An interesting list. (Of course, the analogous "things that use RSA/AES" would be much longer...)
« earlier | later » Page 1 of 4
- crypto | |
1 | + ag0803 |
2 | + api |
1 | + argon2 |
1 | + authentication |
1 | + autoconf |
1 | + book |
1 | + braid |
1 | + ca |
1 | + constant-time |
5 | + djb |
1 | + dns |
1 | + dump |
1 | + ecc |
1 | + ed25519 |
2 | + electronics |
1 | + enigma |
1 | + gpg |
1 | + gsm |
1 | + hash |
1 | + hashing |
2 | + history |
1 | + homeplugav |
1 | + ip |
1 | + ipsec |
1 | + linux |
1 | + mac |
4 | + maths |
1 | + microcontroller |
1 | + monitoring |
6 | + nacl |
3 | + network |
7 | + networking |
2 | + noise |
2 | + packet |
1 | + password |
1 | + perl |
1 | + phone |
2 | + programming |
1 | + protocol-design |
1 | + protocols |
2 | + python |
1 | + radio |
2 | + random |
2 | + research |
1 | + retrocomputing |
1 | + retrotech |
1 | + reverse-engineering |
1 | + rng |
10 | + security |
5 | + software |
1 | + ssh |
2 | + ssl |
1 | + systems |
2 | + tcp |
1 | + teaching |
1 | + tls |
1 | + token |
2 | + tunnel |
1 | + tutorial |
1 | + usability |
1 | + usable-security |
1 | + vcr |
1 | + video |
1 | + vpn |
1 | + web |
1 | + william-gibson |
1 | + ww2 |
tasty by Adam Sampson.