LibreCryptography – Telegram
LibreCryptography
114 subscribers
24 photos
5 files
173 links
Aggregating and Organizing Some Crypto-Related Resources | Under the #librehash brand
Download Telegram
Chacha20 key wrapping + SipHash = https://eprint.iacr.org/2020/059.pdf
A lot cryptographic repos contained here for you to peruse through (hence the name of the GitHub account, I suppose) = https://github.com/CryptoFanOrg
Chacha20 key wrapping + SipHash = https://eprint.iacr.org/2020/059.pdf
Merlin (weird ass website that apparently is for people that are trying to run from the law [just kidding]); this is zero knowledge proofs and some other other shit that's related or peripherally related to it.

https://merlin.cool/ (kind of weird actually ; one off website, designed in the fashion of the Rust documentation)
Trillian (this one is pretty significant) = https://github.com/google/trillian/

Trillian is an implementation of the concepts described in the Verifiable Data Structures white paper, which in turn is an extension and generalisation of the ideas which underpin Certificate Transparency.
HTTP Signed Exchanges

A signed exchange is a delivery mechanism that makes it possible to authenticate the origin of a resource independently of how it was delivered (this sounds cool but I just need to get more information on what the fuck this actually means)

web.dev = https://web.dev/signed-exchanges/

"Signed Exchanges allow a site to cryptographically sign a request/response pair in a way that makes it possible for the browser to verify the origin and integrity of the content independently of how the content was distributed. As a result, the browser can display the URL of the origin site in the address bar, rather than the URL of the server that delivered the content. Separating content attribution from content distribution advances a variety of use cases such as privacy-preserving prefetching, offline internet experiences, and serving content from third-party caches."
Asylo Dev = asylo.dev

Encrypted enclave applications

1. Integrates with gRPC for easy and secure inter-enclave and external communication

2. Use attestation to verify your enclave's integrity, and cryptographically bind your secrets to identity ACLs for safe storage.

Code for piping this all through Docker can be found here = https://asylo.dev/docs/guides/quickstart.html#what-is-an-enclave
Phenomenal post by this individual regarding potential vulnerabilities in attempting to leverage ed25519 for HD keys (not as straightforwarfd as one would imagine that it is)

https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44