• Breaking News

    Thursday, January 31, 2019

    Cryptography NIST announces round 2 post-quantum candidates

    Cryptography NIST announces round 2 post-quantum candidates


    NIST announces round 2 post-quantum candidates

    Posted: 30 Jan 2019 11:35 AM PST

    PKI federation: define a system cryptographically using certs & mTLS to connect across clouds

    Posted: 30 Jan 2019 03:51 PM PST

    Performing length extension attack

    Posted: 30 Jan 2019 01:30 PM PST

    Does anyone know of a good SHA-1 implementation that allows modification of the Initialization Vector. For a class I am in I need to perform and extension attack, but I haven't been able to find a good SHA-1 implementation that allows me to change the IV.

    submitted by /u/Valkuren01
    [link] [comments]

    Proof of DNA possible?

    Posted: 30 Jan 2019 06:04 AM PST

    Would it be possible to generate a pair of keys based on someones biometrics. An application that scans face eyes and fingerprints and uses this information to generate a authentic key. This would be a game changer in my opinion. It would solve the problem of PoW, PoS making the rich richer.

    submitted by /u/exemptionist
    [link] [comments]

    No comments:

    Post a Comment