recentpopularlog in

ianweatherhogg : cryptography   104

« earlier  
Blog Archive - nickler's
Blog Archive 2018 Schnorr and Taproot in Lightning
Sep 04 2018 posted in bitcoin, crypto, lightning Blind Signatures in Scriptless Scripts
Jul 31 …
blogs  cryptography  bitcoin  block  chain  algorithm 
november 2018 by ianweatherhogg
About me
Software designer and crypto-anarchy historian.
about • twitter • github
blogs  bitcoin  block  chain  cryptography  economics 
october 2018 by ianweatherhogg
Toying with Cryptography: Crib Dragging
Cryptograhpy has become very topical in the UK over the last few years, what with the UK government wanting to do nasty things to it. It also happens to be o...
ruby  cryptography 
june 2018 by ianweatherhogg
Handbook of Applied Cryptography
This site provides order information,
updates, errata, supplementary information, chapter bibliographies,
and other information for the Handbook of Applied
Cryptography by Menezes, van Oorschot and Vanstone.
book  free  cryptography 
january 2017 by ianweatherhogg
Blog Archive - Alexander Chepurnoy
Blog Archive 2019 Jan 17 How to set up and configure full Ergo node posted in ergo 2018 Oct 29 Smart Contracts for the People 2017 Feb 20 …
blogs  block  chain  cryptography  bitcoin  ethereum 
december 2016 by ianweatherhogg
Effective Cryptography in the JVM - Terse Systems
Cryptography is hard. But it doesn’t have to be. Most cryptographic errors are in construction, in the joints of putting together well known …
java  jvm  cryptography  security 
january 2016 by ianweatherhogg
24 days of Rust - rust-crypto |
Zbigniew Siciarz - Python and Django programmer, webdeveloper, open standards enthusiast. I make the internetz.
rust  cryptography 
june 2015 by ianweatherhogg
Fixing X.509 Certificates - Terse Systems
This is a continuation in a series of posts about how to correctly configure a TLS client using JSSE, using The Most Dangerous Code in the World as a …
java  ssl  certificate  chain  cryptography  debug  security  5*  scala  play 
march 2015 by ianweatherhogg
NIXAID.COM - Linux/UNIX engineers blog
NIXAID.COM - Site for Linux/UNIX engineers, system administrators, enthusiasts
blogs  python  hacking  lowlevel  c  nasm  assembly  language  cryptography  luks  cipher  encryption  file  linux  nix  dd  uefi  usb  boot  installation  image  5* 
january 2015 by ianweatherhogg
somesocks/lua-lockbox · GitHub
lua-lockbox - A collection of cryptographic primitives written in pure Lua
lua  security  cryptography  github 
january 2015 by ianweatherhogg
node-gpg - Node.js bindings for Gnu Privacy Guard
github  node  gpg  cryptography  security 
june 2014 by ianweatherhogg
indutny/heartbleed · GitHub
heartbleed - Extracting server private key using Heartbleed OpenSSL vulnerability.
github  open  ssl  cryptography  hacking  node  ffi 
april 2014 by ianweatherhogg
Hacking Secret Ciphers with Python - Chapters
Hacking Secret Ciphers with Python is a free ebook programming tutorial for the Python programming language. Learn how to program by hacking ciphers!
book  python  cryptography 
april 2014 by ianweatherhogg
os.urandom() and the random devices (Linux) : Python
The [Python docs say]( of os.urandom() that "on a UNIX-like system this will query /dev/**urandom**", however...
linux  python  random  cryptography  entropy  reddit 
january 2014 by ianweatherhogg
Introduction to Public-Key Cryptography | MDN
Public-key cryptography and related standards and techniques underlie security features of many Red Hat products, including signed and encrypted email, form signing, object signing, single sign-on, and the Secure Sockets Layer (SSL) protocol. This document introduces the basic concepts of public-key cryptography.
public  key  encryption  security  cryptography  certificate  helloworld  5* 
january 2014 by ianweatherhogg
« earlier      
per page:    204080120160

Copy this bookmark:

to read