Description
How many RSA-1024 keys can be factored every year by NSA, or by a botnet, or by China? Is SHA-1 really broken? How hard is it to exploit OpenSSL's timing leaks?
If you care about the answers then your crypto is much too exciting for us. We build boring, conservative, constant-time crypto software.