From 806df870a6f67ca12c0a960cd1a0f5c8d121f899 Mon Sep 17 00:00:00 2001 From: Kevin Deldycke Date: Thu, 8 Sep 2016 15:22:20 +0200 Subject: [PATCH] Add article on how to generate secure random numbers. --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 9da0b39..d3b52fc 100644 --- a/README.md +++ b/README.md @@ -78,6 +78,10 @@ A curated list of cryptography resources and links. - [SHA1](https://en.wikipedia.org/wiki/SHA-1) - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents. - [SHA2](https://en.wikipedia.org/wiki/SHA-2) - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. +### Articles + +- [How to Generate Secure Random Numbers in Various Programming Languages](https://paragonie.com/blog/2016/05/how-generate-secure-random-numbers-in-various-programming-languages). + ### Books - [A Graduate Course in Applied Cryptography](https://crypto.stanford.edu/~dabo/cryptobook/) - The book covers many constructions for different tasks in cryptography.