-
I see that Laverna can cypher the notes. That is perfect and mandatory for notes stored on an external server like dropbox.
Can you document how the cryptography is used?
What cryptographic algorithm…
-
To allow running of clickhouse in governmental agencies.
May require:
1. Moving to a FIPS-validated version of boringSSL
https://boringssl.googlesource.com/boringssl/+/refs/heads/master/crypto/fips…
-
# WIP
### Goals and Objectives
**Objective:** Develop and enhance the Theory section of Polykey’s documentation to provide users with in-depth theoretical knowledge that supports their understanding…
-
Hi
first of all, thanks for the effort in brining improvements in the java module system.
May I ask you if you spot a room for adding some enforcing rules on modules themselves, such as loading co…
-
This discussion was started in WASI repo https://github.com/WebAssembly/WASI/issues/65.
It'd be great to have a way to keep wasm computations constant time (and prevent JIT optimizations) to implemen…
-
**Description**
Now that NIST has [announced](https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms) the first few quantum-resistant cry…
-
## CVE-2012-5575 - Medium Severity Vulnerability
Vulnerable Library - cxf-rt-ws-security-2.7.18.SP5-redhat-1.jar
Apache CXF Runtime WS Security
Library home page: http://www.apache.org/
Path to depe…
-
**Describe the feature:**
Usage of 3rd party libraries for hashing and other cryptographic features make it difficult to audit for FIPS compliance.
As we move towards our FedRampHigh and eventual FI…
-
## CVE-2023-2650 - Medium Severity Vulnerability
Vulnerable Libraries - cryptography-3.4.7-cp36-abi3-manylinux2014_x86_64.whl, cryptography-2.3-cp34-abi3-manylinux1_x86_64.whl
cryptography-3.4.7-cp…
-
Bitwise operations can be performed on byte strings only in CIP-0058. On the other hand the aritmetic operations can be performed on integers only. In cryptographic algorithms arithmetic and bitwise o…