-
It would be amazing if I could attach any number of "claims" to a document, using digital signatures.
Use cases include:
1. Approving a document
2. Confirming an invoice as paid
3. Accepting a…
-
-
Don't use HMAC here. Instead, use in order of preference:
1. Ed25519 (via ext/libsodium)
2. [Deterministic ECDSA over seck1p256](https://tools.ietf.org/html/rfc6979#section-3)
3. RSA (via phpseclib) w…
-
### Proposal
A workflow like this would be great:
1. A PR is opened to perform some infrastructure change.
2. The plan is signed by a local key (perhaps even on a Yubikey or similar) on an engi…
-
With #55690 merged, the implementations of the S.S.Cryptography assemblies have been consolidated in to a single in-box assembly, where possible.
The unit tests for these are still in their separat…
-
## Build Information
Build: https://dev.azure.com/dnceng-public/cbb18261-c48f-4abb-8651-8cdcb5474649/_build/results?buildId=712715
Build error leg or test failing: System.Security.Cryptography.X509C…
-
Hi,
You're using bad crypto throughout. For example hashing with MD5 is not encrypting data. I'd suggest adding a **big** warning in the README file and taking a look into http://cacr.uwaterloo.ca/ha…
-
To increase the trustworthiness of the platform and allow users to certify that they are installing what they expect, I suggested in [a Coq Zulip topic](https://coq.gitlab.io/zulip-archive/stream/2506…
-
This is an exhaustive list, not everything is needed
1. All hash functions in https://github.com/coruus/sphlib (SHA3 candidates)
2. All finalists hash functions in https://github.com/bsdphk/PHC (pas…
-
I was looking for some kind of document explaining your use of cryptography but could not find any, and the wiki seems empty. So, how are you implementing end-to-end encryption?