-
like it was done for [P-521](https://github.com/RustCrypto/elliptic-curves/blob/master/p521/src/lib.rs) ?
-
The current proposal uses SHA256 hashing for POW to incur a cost on a message creator.
For a spammer, this is quite agreeable - he can purchase an ASIC and can churn out spam in a much more efficie…
-
### Proposal Details
I propose to move the [golang.org/x/crypto/pbkdf2](https://pkg.go.dev/golang.org/x/crypto/pbkdf2) package into the standard library with the name `crypto/pbkdf2`. This proposal…
-
I noticed, that there is no facility to query the key size for a MAC algorithm and a way to get the block size has already been requested (#12342). Also for other parameters like IV, Salt and Customiz…
-
Problem recreated as shown below with the default openssl.cnf
```
./openssl genrsa -provider fips -f4 2048
genrsa: unable to load provider fips
C0FDC40A01000000:error::common libcrypto routi…
-
**Description**
In an effort to make [Chatmail](https://github.com/deltachat/chatmail) compatible with OpenBSD and OpenSMTPD, I ran into the issue where [`deltachat-core-rust`](https://github.com/d…
-
### The problem you're addressing (if any)
QubesOS 4.1 seems to use argon2i (**not** argon2id) by default for the LUKS KDF.
It would appear as though argon2i is less resistant to attack by sophi…
-
丢进`libbasic_share`里了,同时把函数的符号加了回来
需要适配一下(具体来说要在`libkernel`中找不到函数时尝试在`libbasic_share`中找,并且优先使用`findExportByName`来利用符号信息)
-
At Red Hat, we set the SECLEVEL to 2 in DEFAULT and LEGACY policies (in crypto-policies [1], not providers). So when SECLEVEL 2 is in use, the creation and verification of SHA-1 signatures is rejected…
-
## Description
It seems that the rnp_op_encrypt_t can't be used for multiple consecutive calls with the same password. That's bad, because the key derivation functions are very expensive on purpose…