-
https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html
-
**Describe the bug**
PwdHash2 incorrectly uses the domain name as salt for the PBKDF2 construction. This means that an attacker knows the salt, allowing her to precompute data structures like rainbo…
-
Any chance of getting some kind of cryptographic security into docker? If this is going to become a major way of pushing linux images around, I really think that security should be baked in by default…
-
From time to time I get requests to implement "real" cryptographic ciphers in KS (like DES, AES, IDEA, RC*, etc). I'll try to outline what I have in mind on how to implement that.
1. We start creat…
-
### Use case
For bitcoin.
### Describe the solution you'd like
Add it similarly to the existing cryptographic hash functions.
-
## Description
IIUC AsymmetricPrivateKeys have size linits depending on the key type.
Looks like minimal size is 128bit - https://www.cryptomathic.com/news-events/blog/classification-of-cryptographi…
-
CP currently has hashlib based upon frozen code, providing sha1 and sha256 for instance.
aesio, c lib based, but not included by default in the Pico port.
SHA hash functions are widely used primit…
-
# Common Cryptographic Operations With Cryptokit • Andy Ibanez
undefined
[https://www.andyibanez.com/posts/common-cryptographic-operations-with-cryptokit/?utm_campaign=iOS%2BDev%2BWeekly&utm_medium=…
-
Currently, changes in the RPC protocol require either very careful versioning, or you will run into the issue that some RPC methods will just break in a very silent/annoying way over time as you evolv…
-
`cryptographic_binding_methods_supported` feels like it's probably a bit under defined.
https://openid.github.io/OpenID4VCI/openid-4-verifiable-credential-issuance-wg-draft.html#section-11.2.3 says…
jogu updated
7 months ago