« earlier | later » Page 3 of 4
Introduction to CurveCP edit / delete
A TCP-like protocol using NaCl's crypto. Interesting in that it's done entirely in userspace over UDP, with an eye both on pervasive crypto and good performance. Unfortunately the web site's a bit incomplete -- e.g. it suggests there's a CurveCP-like mechanism for encoding public keys in server names, but doesn't describe it.
to crypto nacl networking protocol-design tcp ... on 24 October 2013
Introduction to DNSCurve edit / delete
DNS with NaCl cryptography. Encoding the public key in the nameserver's name is a cute trick (and works because the underlying algorithms allow secure short keys). Of course, this has absolutely no chance of being implemented by anyone :(
Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.
to api crypto djb nacl network security software ... on 24 October 2013
Cryptography and Braid Groups edit / delete
Handy list of references.
Bob Jenkins' Web Site edit / delete
Good material on simple hash functions and PRNGs, and how to test them.
Old spy radios and related equipment.
Chris's Wiki :: blog/python/IdealDWikiCrypto edit / delete
Using HMAC for web auth. I should fix tasty to do this at some point.
to crypto programming python security web ... on 27 January 2010
Various documents on early computers. The long paper on breaking the Tunny cryptosystem is especially interesting.
to crypto history maths retrocomputing ... on 14 June 2006
« earlier | later » Page 3 of 4
- crypto | |
1 | + ag0803 |
2 | + api |
1 | + argon2 |
1 | + authentication |
1 | + autoconf |
1 | + book |
1 | + braid |
1 | + ca |
1 | + constant-time |
5 | + djb |
1 | + dns |
1 | + dump |
1 | + ecc |
1 | + ed25519 |
2 | + electronics |
1 | + enigma |
1 | + gpg |
1 | + gsm |
1 | + hash |
1 | + hashing |
2 | + history |
1 | + homeplugav |
1 | + ip |
1 | + ipsec |
1 | + linux |
1 | + mac |
4 | + maths |
1 | + microcontroller |
1 | + monitoring |
6 | + nacl |
3 | + network |
7 | + networking |
2 | + noise |
2 | + packet |
1 | + password |
1 | + perl |
1 | + phone |
2 | + programming |
1 | + protocol-design |
1 | + protocols |
2 | + python |
1 | + radio |
2 | + random |
2 | + research |
1 | + retrocomputing |
1 | + retrotech |
1 | + reverse-engineering |
1 | + rng |
10 | + security |
5 | + software |
1 | + ssh |
2 | + ssl |
1 | + systems |
2 | + tcp |
1 | + teaching |
1 | + tls |
1 | + token |
2 | + tunnel |
1 | + tutorial |
1 | + usability |
1 | + usable-security |
1 | + vcr |
1 | + video |
1 | + vpn |
1 | + web |
1 | + william-gibson |
1 | + ww2 |
tasty by Adam Sampson.