Cryptography NIST announces round 2 post-quantum candidates |
- NIST announces round 2 post-quantum candidates
- PKI federation: define a system cryptographically using certs & mTLS to connect across clouds
- Performing length extension attack
- Proof of DNA possible?
NIST announces round 2 post-quantum candidates Posted: 30 Jan 2019 11:35 AM PST |
PKI federation: define a system cryptographically using certs & mTLS to connect across clouds Posted: 30 Jan 2019 03:51 PM PST |
Performing length extension attack Posted: 30 Jan 2019 01:30 PM PST Does anyone know of a good SHA-1 implementation that allows modification of the Initialization Vector. For a class I am in I need to perform and extension attack, but I haven't been able to find a good SHA-1 implementation that allows me to change the IV. [link] [comments] |
Posted: 30 Jan 2019 06:04 AM PST Would it be possible to generate a pair of keys based on someones biometrics. An application that scans face eyes and fingerprints and uses this information to generate a authentic key. This would be a game changer in my opinion. It would solve the problem of PoW, PoS making the rich richer. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment