Constant-time nonce-reuse resistant auth'd crypto in H/W with keys exchanged by supersingular elliptic curve isogenypic.twitter.com/AmH14B9NJm
-
-
Replying to @sh4rkface
@sh4rkface@SwiftOnSecurity Birthday collisions are what cryptographers are mostly interested in. You should be using urandom and prepending2 replies 0 retweets 0 likes
Replying to @CiPHPerCoder
@CiPHPerCoder Or use a part of the nonce to derive a subkey: https://download.libsodium.org/doc/key_derivation/index.html#nonce-extension …
0 replies
1 retweet
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.