SECURITY
Authenticated Encryption and how not to get caught chasing a coyote
I introduced HMAC (Hash-based Message Authentication Code) through the back door when talking about …
Continue readingI introduced HMAC (Hash-based Message Authentication Code) through the back door when talking about …
Continue readingIn my discussion of Dropbox’s new two-step authentication, I skimped on the cryptography. Because we …
Continue readingAlan Turing was born a hundred years ago this year and his most important paper was published …
Continue readingThe net is atwitter with discussion of Jeremi Gosney’s specially crafted machine with 25 GPUs that …
Continue readingNicole Perlroth of The New York Times penned an article on “How to Devise Passwords That Drive …
Continue readingAs LĂvia and I were out walking Molly and Patty on Monday evening, I received a telephone call from …
Continue reading