Explore >> Select a destination


You are here

kndrck.co
| | berty.tech
2.9 parsecs away

Travel
| | You have probably already heard about cryptography and, more specifically, about end-to-end encryption. But do you know what it really is?
| | unorde.red
3.0 parsecs away

Travel
| | [AI summary] This article explains the Diffie-Hellman key exchange algorithm, its mathematical foundation in discrete logarithm problems, and its security implications in modern cryptography.
| | asecuritysite.com
3.3 parsecs away

Travel
| | [AI summary] The provided code demonstrates the implementation of Elliptic Curve Diffie-Hellman (ECDH) key exchange using various elliptic curves. It includes functions for modular arithmetic, point operations on elliptic curves, and key generation. The code generates key pairs for Alice and Bob, computes shared secrets, and prints the results. The shared secret is derived from the x-coordinate of the resulting point. The page also includes references and licensing information for proper citation.
| | rareskills.io
7.1 parsecs away

Travel
| Elliptic Curves over Finite Fields What do elliptic curves in finite fields look like? It's easy to visualize smooth elliptic curves, but what do elliptic curves over a finite field look like? The following is a plot of $y² = x³ + 3 \pmod {23}$ Because we only allow integer inputs (more specifically, finite field...