-
Thanks for @emschwartz for pioneering this line of thinking and forcing me to write it up for discussion and - eventually - posterity.
### History
When the [first prototype](https://github.com/j…
-
https://news.ycombinator.com/item?id=7812133
truecrypt.org => truecrypt.sourceforge.net
https://gist.github.com/anonymous/e5791d5703325b9cf6d1
-
Remove the _double storage principle_ of Tribler. Dispersy becomes a state-less and clean overlay.
Each Dispersy community is now responsible for their own storage. We now have significant overlap …
-
Mirek,
Which symmetric key algorithm ( AES , XSalsa20 ... ) is used to protect the private key generated in Codecrypt , if at all ?
ghost updated
7 years ago
-
**Update again:**
```rust
pub trait SeedRestriction: private::Sealed + Default + AsMut {}
pub trait SeedableRng: Sized {
type Seed: SeedRestriction;
fn from_seed(seed: Self::Seed) -> …
-
The Dutch National Cyber Security Center (NCSC) released guidelines regarding crypto in a post-quantum cryptography world:
https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/factsheets/fa…
-
speaker: Daniel J. Bernstein, Tanja Lange
topic: Post-Quantum Cryptography
video: https://www.youtube.com/watch?v=6XeBvdm8vao
length: ~60 minutes
A gentle introduction to post-quantum cryptography
L…
-
🙈 It's a hash tree with a traditional SHA-256 Algorithm...
-
Its expected that large quantum computers will eventually be developed within 10-15 years.
https://pqcrypto.org/
Their cryptanalytic capabilities will render all asymmetrical encryption used to …
-