Explore >> Select a destination


You are here

vaguery.com
| | shrik3.com
5.0 parsecs away

Travel
| | [AI summary] This post explains the RSA algorithm, its mathematical foundations, and applications in cryptography, including key generation, encryption/decryption processes, and security principles.
| | jeremykun.wordpress.com
6.9 parsecs away

Travel
| | The Learning With Errors problem is the basis of a few cryptosystems, and a foundation for many fully homomorphic encryption (FHE) schemes. In this article I'll describe a technique used in some of these schemes called modulus switching. In brief, an LWE sample is a vector of values in $\mathbb{Z}/q\mathbb{Z}$ for some $q$, and in...
| | www.jeremykun.com
7.6 parsecs away

Travel
| | This post assumes working knowledge of elementary number theory. Luckily for the non-mathematicians, we cover all required knowledge and notation in our number theory primer. So Three Thousand Years of Number Theory Wasn't Pointless It's often tough to come up with concrete applications of pure mathematics. In fact, before computers came along mathematics was used mostly for navigation, astronomy, and war. In the real world it almost always coincided with the physical sciences.
| | nicholasjoncrane.wordpress.com
36.1 parsecs away

Travel
| There are a number of stimulating reflections/provocations/proposals, etc., in this post by John Krygier about Matt Wilson'sNew Lines.