|
You are here |
www.pagetable.com | ||
| | | | |
incoherency.co.uk
|
|
| | | | | [AI summary] The author explores their journey into CPU design, discussing FPGA projects, DIY CPUs like Ben Eater's breadboard CPU and Magic-1, and reflections on learning Verilog and the Nand2Tetris course to build a simple CPU capable of running an OS. | |
| | | | |
benjcal.space
|
|
| | | | | The Adventures of Writing a CHIP8 Emulator - Part 1 | |
| | | | |
leventkaya.com
|
|
| | | | | Technical and Personal Blog | |
| | | | |
www.jeremykun.com
|
|
| | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | ||