recentpopularlog in

cryptography

« earlier   
A zero-knowledge proof for the existence of God | Robert Heaton
Judeo-Christian God was in trouble. The latest polls were in, and belief in him was down, especially amongst the key millennial demographic. He needed to come up with a punchy viral marketing campaign to regain control of the conversation.
cryptography  zero-knowledge  short-story 
yesterday by lorenzck
TweetNaCl.js
Port of TweetNaCl / NaCl to JavaScript for modern browsers and Node.js. Public domain.

The primary goal of this project is to produce a translation of TweetNaCl to JavaScript which is as close as possible to the original C implementation, plus a thin layer of idiomatic high-level API on top of it.
NaCl  security  JavaScript  cryptography 
yesterday by lidel
Fluidkeys
Protect your team with strong encryption. Fluidkeys builds on OpenPGP and makes it easy to implement great security across your organisation.
encryption  security  GnuPG  OpenPGP  cryptography 
3 days ago by aldolat
Palisade / PALISADE · GitLab
The PALISADE Lattice Cryptography Library. This is the stable, public version of the Palisade lattice encryption library. Please read the project wiki for information on how to download and use...
cryptography 
4 days ago by twleung
GitHub - google/tink: Tink is a multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Tink is a multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. Java, C++, Go, Objective-C.
java  cpp  go  golang  objectivec  objc  swift  google  cryptography 
6 days ago by dlkinney
A (Relatively Easy To Understand) Primer on Elliptic Curve Cryptography
24 Oct 2013 by Nick Sullivan.

inShare

Elliptic Curve Cryptography (ECC) is one of the most powerful but least understood types of cryptography in wide use today. At CloudFlare, we make extensive use of ECC to secure everything from our customers' HTTPS connections to how we pass data between our data centers.

Fundamentally, we believe it's important to be able to understand the technology behind any security system in order to trust it. To that end, we looked around to find a good, relatively easy-to-understand primer on ECC in order to share with our users. Finding none, we decided to write one ourselves. That is what follows.

Be warned: this is a complicated subject and it's not possible to boil down to a pithy blog post. In other words, settle in for a bit of an epic because there's a lot to cover. If you just want the gist, the TL;DR is: ECC is the next generation of public key cryptography and, based on currently understood mathematics, provides a significantly more secure foundation than first generation public key cryptography systems like RSA. If you're worried about ensuring the highest level of security while maintaining performance, ECC makes sense to adopt. If you're interested in the details, read on.
cryptography 
6 days ago by HM0880
Quantum Computing and Cryptography - Schneier on Security
At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
bruceschneier  quantumcomputers  cryptography 
7 days ago by dlkinney

Copy this bookmark:





to read