Cryptography Spectre attacks: exploiting speculative execution (to break software side-channel defenses) |
- Spectre attacks: exploiting speculative execution (to break software side-channel defenses)
- Anyone taking Cryptography with Katz on Coursera?
- HMAC with other hashing algorithms (X-Post from r/cryptography)
- TRON Update: Airdrop - January 04 , 2018
- Cracking AEZv4 with Simon's Algorithm
Spectre attacks: exploiting speculative execution (to break software side-channel defenses) Posted: 03 Jan 2018 02:49 PM PST |
Anyone taking Cryptography with Katz on Coursera? Posted: 03 Jan 2018 07:54 PM PST |
HMAC with other hashing algorithms (X-Post from r/cryptography) Posted: 03 Jan 2018 09:10 PM PST I am a cryptography noob, and I have been reading recently about HTTP authentication. I stumbled upon digest and Hawk, and they seem to be using HMAC signatures with a SHA1 or SHA256 hashing algorithm. Would it be bad for me to replace that SHA1 or SHA256 with something else like Groestl? I apologize for not being knowledgable here, but my question is why non-mainstream hashing algorithms haven't been used for HMAC. [link] [comments] |
TRON Update: Airdrop - January 04 , 2018 Posted: 03 Jan 2018 11:11 PM PST |
Cracking AEZv4 with Simon's Algorithm Posted: 03 Jan 2018 10:18 AM PST |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment