Explore >> Select a destination


You are here

vaguery.com
| | www.jeremykun.com
7.6 parsecs away

Travel
| | This post assumes working knowledge of elementary number theory. Luckily for the non-mathematicians, we cover all required knowledge and notation in our number theory primer. So Three Thousand Years of Number Theory Wasn't Pointless It's often tough to come up with concrete applications of pure mathematics. In fact, before computers came along mathematics was used mostly for navigation, astronomy, and war. In the real world it almost always coincided with the physical sciences.
| | shrik3.com
5.0 parsecs away

Travel
| | [AI summary] This post explains the RSA algorithm, its mathematical foundations, and applications in cryptography, including key generation, encryption/decryption processes, and security principles.
| | jeremykun.wordpress.com
6.9 parsecs away

Travel
| | The Learning With Errors problem is the basis of a few cryptosystems, and a foundation for many fully homomorphic encryption (FHE) schemes. In this article I'll describe a technique used in some of these schemes called modulus switching. In brief, an LWE sample is a vector of values in $\mathbb{Z}/q\mathbb{Z}$ for some $q$, and in...
| | asecuritysite.com
19.8 parsecs away

Travel
| [AI summary] The provided code demonstrates the implementation of Elliptic Curve Diffie-Hellman (ECDH) key exchange using various elliptic curves. It includes functions for modular arithmetic, point operations on elliptic curves, and key generation. The code generates key pairs for Alice and Bob, computes shared secrets, and prints the results. The shared secret is derived from the x-coordinate of the resulting point. The page also includes references and licensing information for proper citation.