michalspacek.cz
Přednáška Webová bezpečnost (Google Developer Group Spaghetti Code Liberec) | Michal Špaček
https://www.michalspacek.cz/prednasky/webova-bezpecnost-gdgscl
Raquo; Michal Špaček. Http:/ www.slideshare.net/spaze/bezpecnost-nocni-mury. Https:/ www.youtube.com/watch? Zajímá vás webová bezpečnost? Přijďte si o tom popovídat na školení Bezpečnost PHP aplikací. Praha, prosinec 2016. Vytváříte bezpečná hesla a máte zabezpečený prohlížeč? Že nevíte jak na to? Prozradím vám to na školení Bezpečnost pro uživatele. Si můžete zkusit na mém testovacím webu na adrese http:/ exploited.cz/products.php. Měl by vás zajímat parametr. Který je sice ošetřen pomocí. Tato verze sl...
en.wikipedia.org
PBKDF2 - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/PBKDF2
From Wikipedia, the free encyclopedia. This article has an unclear citation style. The references used may be made clearer with a different or consistent style of citation. Learn how and when to remove this template message. Password-Based Key Derivation Function 2. Is part of RSA Laboratories. PKCS) series, specifically PKCS #5 v2.0, also published as Internet Engineering Task Force. It replaces an earlier key derivation function. Which could only produce derived keys up to 160 bits long. For attacks, a...
jaredrobinson.com
jaredrobinson.com
http://jaredrobinson.com/blog
Python attrs library; stackoverflow documentation. Article: The One Python Library Everyone Needs: attrs. Some people are excited about eventually being able to program in Python 3 everywhere. What I’m looking forward to is being able to program in Python-with-attrs everywhere. It exerts a subtle, but positive, design influence in all the codebases I’ve see it used in. Or, for those who want more power (an complexity) than the attrs module, there’s macropy and it’s case-classes. And it sounds impressive.
jorgenmodin.net
jorgenmodin.net - Blog — jorgenmodin.net
http://jorgenmodin.net/index_html/jorgenmodin.net-blog?b_start:int=10
Only in current section. Jorgenmodin.net - Blog. A new generation of hashing algorithms. A competition was held and Argon2 was selected as winner:. It seems one of the traits they were looking at was resistance to ASIC optimization. Honorable mentions of Catena, Lyra2, Makwa and Yescrypt. Jun 23, 2016 03:52. Some languages that compile to javascript. Most of these untested by me. Clojurescript clojure/clojurescript: Clojure to JS compiler. Kotlin JavaScript Interop Kotlin Blog. Nim Nim Backend Integration.
cryptolux.org
ESC2015
https://www.cryptolux.org/mediawiki-esc2015/index.php/ESC_2015
Early Symmetric Crypto (ESC) 12-16 January 2015 in Clervaux, Luxembourg. Early Symmetric Cryptography (ESC) is a bi-annual event ( 2008. Taking place in Luxembourg and paired with Dagstuhl seminars ( 2007. Symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and. Complex cryptosystems and cryptographic protocols employing these primitives. Algorithmic challenges in public and symmetric cryptography. The List of topics. Evaluation of submissions for the authent...
cryptolux.org
CryptoLUX > Projects
https://www.cryptolux.org/index.php/Projects
Memory hard functions, our submission to the PHC competition. Evaluation and Analysis of Authenticated Encryption Schemes (Started in April 2015). Retrieved from " https:/ www.cryptolux.org/index.php? This page was last modified on 22 May 2015, at 10:50. This page has been accessed 5,556 times.
en.wikipedia.org
Key stretching - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Key_stretching
From Wikipedia, the free encyclopedia. Refers to techniques used to make a possibly weak key. More secure against a brute force attack. By increasing the time it takes to test each possible key. Passwords or passphrases created by humans are often short or predictable enough to allow password cracking. Key stretching makes such attacks more difficult. Key stretching techniques generally work as follows. The initial key is fed into an algorithm that outputs an enhanced key. Or a block cipher. Is for gener...
dfranke.us
Bio of Daniel Fox Franke — Indistinguishable from Random
https://www.dfranke.us/bio.html
We (finally) Have the Technology: Creating Beautiful Typography for the Web. Shell Shock Exploitation Vectors. Bio of Daniel Fox Franke. Photos by Jeninne Cathers. I’m a security researcher. Working for Akamai Technologies. Information Security department and specializing in cryptography. My job, in essence, is to help engineers write crypto that’s less broken. I make frequent use of formal methods. Toolkits such as ProVerif. I was born in Massachusetts. Grew up in Florida. I write my code in Haskell.