-
#13163 will be bringing in the long-awaited replacement of numpy's PRNG infrastructure. In the interest of keeping that PR manageable, we will merge it to master before all of the decisions are finali…
rkern updated
5 years ago
-
# Description
> "There's a straightforward mitigation though: double the key size. In a post-quantum world, AES-256 is still comfortably secure. PGP and GPG are programs that use a variety of crypt…
-
Join in for the weekly Monero Research Lab meeting.
**When**: Monday, 22 April 2019 @ 17:00 UTC
**Where**: #monero-research-lab (freenode/matrix)
**Agenda**
1. Greetings
2. Roundtable
a. S…
-
BlackCoin key creation is managed by ECDSA, a standard using an elliptic curve algorithm to determine a private/public key pair. ECDSA elliptic curves are _dead_ when quantum computers become/are avai…
-
* we need directory authority and mix identity key agility; that is we need a system that supports offline longterm signing keys and online midterm signing keys, certificates for the midterm keys sign…
-
# [GoNetwork](https://gonetwork.co/) (GOT)
## Team
- Rashid Khan (Co-founder & CEO) - Jan 2016 - Present | [Linkedin profile](https://www.linkedin.com/in/infinidy/)
- Xun Cai (Co-founder & COO) …
-
I'm experimenting with the integration of post-quantum cryptography into TLS 1.3 using OpenSSL. I got the post-quantum key exchange to work (*), and I'm now working on the authentication.
I ran int…
-
Let's include the `curve_nid` in the bytes of a `Capsule` so that `Ursula` can know which curve was used to create it.
-
Distributing a signature with every package is the obvious first step in package authentication, but is a bit dangerous without a means to permanently revoke a key or packages in the event that a secr…
ehmry updated
6 years ago
-