排序
Introducing the O(1) Cryptography Project
Introducing the O(1) Cryptography Project,Cryptography is a fascinating subject at the intersection of pure math and computer science that has become nearly ubiquitous over the pas...
Exploring the ChaCha stream cipher
Exploring the ChaCha stream cipher,Stream ciphers form the basis for simpler encryption and decryption algorithms than traditional block ciphers like AES. In particular, the ChaCha...
Securing secret key in Android using Keystore
Securing secret key in Android using Keystore,At some point in time, we all wanted to keep our data secure from being hacked/reverse engineered. The basic security mechanisms like,...
Radix building blocks – File notarization (live)
Radix building blocks - File notarization (live), Introduction Thanks to the storage immutability and time-stamping capabilities of the public DLT, notarization is one of the most ...
Java KeyStores—the gory details
Java KeyStores—the gory details,Originally posted on my blog Java KeyStores are used to store key material and associated certificates in an encrypted and integrity protected fash...