-
Recent Posts
Recent Comments
Archives
- October 2015
- July 2015
- April 2015
- March 2015
- August 2014
- July 2014
- June 2014
- February 2014
- January 2014
- September 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- April 2012
- March 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
Categories
- Bicycling
- BITS Upload Protocol
- Books
- China
- Computers
- Conferences
- Cookies
- Cryptography
- Digital Politics
- Emedded Devices
- Food and Drink
- Humor
- India
- jCIFS
- Minnesota Politics
- Music
- Neighborhood and Community
- Network Protocols
- Notoriety
- PeerDist
- Proprietary Protocols
- Religious Observance
- Samba
- School
- Self
- SMB/CIFS
- Tablets and "Smart" Phones
- Tea
- The Docs
- Travel
- Tribulations
- Trivia
- Uncategorized
- US Politics
- World Domination
Meta
Category Archives: Cryptography
Does This Count Against My Fifteen Minutes?
Geeks like to gather together in large groups, sort of like schools of fish or herds of four-legged grass-eating cheetah snacks. Perhaps it’s a primordial instinct. Perhaps we feel safer that way. Perhaps that’s why we go to conferences.
Cryptographic Hardware under Linux
The idea is fairly simple. There are several commonly used cryptographic algorithms (with names like DES, AES, and SHA-256), most of which are designed to be easy to implement in hardware. In other words, chips can scramble bits really well, … Continue reading