EUNO.NEWS EUNO.NEWS
  • All (20993) +299
  • AI (3155) +14
  • DevOps (933) +7
  • Software (11054) +203
  • IT (5802) +74
  • Education (48)
  • Notice
  • All (20993) +299
    • AI (3155) +14
    • DevOps (933) +7
    • Software (11054) +203
    • IT (5802) +74
    • Education (48)
  • Notice
  • All (20993) +299
  • AI (3155) +14
  • DevOps (933) +7
  • Software (11054) +203
  • IT (5802) +74
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 1 month ago · software

    Rust Weekly Log: Crypto Foundations & Clean Architecture

    Sealed in Rust I added a new section on key derivation, explaining how it naturally connects symmetric encryption to hashing. This chapter sets the groundwork...

    #rust #cryptography #clean-architecture #key-derivation #hexagonal-architecture
  • 1 month ago · software

    How to Store Critical Secrets for 100+ Years

    The “Root of Trust” Problem Every sophisticated security system eventually collapses into a single point of failure: one string of data. Whether it is a blockc...

    #encryption #secret management #key storage #long‑term data preservation #BYOE #security #cryptography
  • 1 month ago · it

    Stop Breaking TLS

    Article URL: https://www.markround.com/blog/2025/12/09/stop-breaking-tls/ Comments URL: https://news.ycombinator.com/item?id=46214950 Points: 26 Comments: 3...

    #TLS #encryption #HTTPS #security #protocol #web security #cryptography
  • 1 month ago · it

    Substitution Cipher Based on The Voynich Manuscript

    Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“: Abstract: In this article,...

    #cryptography #substitution-cipher #Voynich-Manuscript #security #research-paper
  • 1 month ago · it

    A Deep Cybersecurity View of Encryption

    Encryption: Two‑Way Protection Encryption turns readable data into unreadable ciphertext. With the correct key, it can be reversed. Symmetric Encryption Uses a...

    #encryption #TLS #cybersecurity #PKI #cryptography
  • 1 month ago · it

    Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

    Ketika G. H. Hardy dengan bangga menyatakan bahwa karyanya dalam matematika murni tidak akan pernah berguna dalam praktik, ia ternyata keliru besar. Lebih dari...

    #cryptography #number theory #RSA #G.H. Hardy #modern security
  • 1 month ago · software

    Understanding ECDSA

    This article is basically an exercise in understanding ECDSA Elliptic Curve Digital Signature Algorithm from scratch. All I assume is some basic math and a will...

    #ECDSA #elliptic-curve-cryptography #digital-signatures #cryptography #security #algorithm #math
  • 1 month ago · software

    Construí un Gestor de Contraseñas Avanzado en Julia (oh si, Juliaaaa)

    Escribo herramientas para no hacer las cosas aburridas dos veces, y últimamente lo he estado haciendo en lenguajes que nadie espera. Esta vez: Julia. Sí, ese le...

    #Julia #password manager #cryptography #entropy #CLI

Newer posts

Older posts
EUNO.NEWS
RSS GitHub © 2026