Explore >> Select a destination


You are here

www.jeremykun.com
| | andrea.corbellini.name
1.6 parsecs away

Travel
| | [AI summary] The post provides an in-depth explanation of elliptic curve cryptography, covering key concepts like scalar multiplication, the discrete logarithm problem, and the double-and-add algorithm. It emphasizes the importance of the discrete logarithm being a hard problem, which is crucial for the security of elliptic curve cryptography. The post also touches on the Weierstrass normal form, which simplifies the equations for scalar multiplication and point addition. The author concludes by mentioning the next post will focus on finite fields and the discrete logarithm problem, with examples and tools for exploration.
| | thatsmaths.com
2.5 parsecs away

Travel
| | There are numerous branches of mathematics, from arithmetic, geometry and algebra at an elementary level to more advanced fields like number theory, topology and complex analysis. Each branch has its own distinct set of axioms, or fundamental assumptions, from which theorems are derived by logical processes. While each branch has its own flavour, character and...
| | www.johndcook.com
2.4 parsecs away

Travel
| | The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview.
| | www.cybereason.com
20.6 parsecs away

Travel
| In this high-stakes game of cat and mouse, the use of artificial intelligence (AI) has emerged as a powerful tool in the fight against cyber threats.