Explore >> Select a destination


You are here

www.johndcook.com
| | www.jeremykun.com
2.6 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | fernandocorreia.dev
2.4 parsecs away

Travel
| | This is part 23 of my journey learning Golang. Random number generators For some kinds of programs, like simulations, games, or test code, it is useful to be ...
| | www.pcg-random.org
3.5 parsecs away

Travel
| | Using the Minimal C Implementation
| | blog.k3170makan.com
46.8 parsecs away

Travel
| Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security