If you're planning on implementing the W3C and FIDO Alliance's new WebAuthn standard for hardware security token support, skip ECDAA for now.
A brief overview of the various common use-cases of asymmetric cryptography (also known as "public-key cryptography") from the perspective of a software developer.
A deep dive into preventing chosen-ciphertext (e.g. padding oracle) attacks against RSA in custom encrypted transport protocols.
Paseto (Platform-Agnostic Security Tokens) is everything JWT should be, but isn't (namely, secure)
Everything a developer needs to know to build secure software in the PHP programming language in the year 2018
How to build a homomorphic encryption scheme that is not vulnerable to chosen-ciphertext attacks, using blockchain-like protocols.
How to build your own automatic update system that is verifiably secure.
A reflection on the first six months of the year, ext/sodium landing in PHP 7.2, and where to go from here.
With Chronicle, you probably don't need a blockchain to solve your problems anymore.
How to implement field-level data encryption while still allowing fast queries.
Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?
Our team of technology consultants have extensive knowledge and experience with application security and web/application development.
Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.
The first mails quarterly and often showcases our behind-the-scenes projects.
The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.