The TinyCrypt Library provides an implementation for constrained devices of a minimal set of standard cryptography primitives.
they do not fail catastrophically if a nonce is repeated
A PAKE protocol, first introduced by Bellovin and Merritt, is a special form of cryptographic key exchange protocol. Key exchange (or “key agreement”) protocols are designed to help two parties (call them a client and server) agree on a shared key, using public-key cryptography.
The main result of this investigation is that “the historical success of collision attacks does not imply a danger of pre-image attacks”.
Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how.
RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.
The National Security Agency has released an archive of back issues of Cryptolog, its secret, in-house magazine, in a repository spanning 1974 to 1997.
Philadelphia CryptoParty is a chance to meet other people interested in cryptography and computer security. The event will be open to those wanting to learn, teach, or a little of both. There are no prerequisites - if you know absolutely nothing (or absolutely everything) about cryptography this is the event for you. All are welcome!