Explore >> Select a destination


You are here

kndrck.co
| | dusted.codes
2.6 parsecs away

Travel
| | The beauty of asymmetric encryption - RSA crash course for developers
| | shrik3.com
1.3 parsecs away

Travel
| | [AI summary] This post explains the RSA algorithm, its mathematical foundations, and applications in cryptography, including key generation, encryption/decryption processes, and security principles.
| | unorde.red
2.7 parsecs away

Travel
| | [AI summary] This article explains the Diffie-Hellman key exchange algorithm, its mathematical foundation in discrete logarithm problems, and its security implications in modern cryptography.
| | www.jeremykun.com
21.7 parsecs away

Travel
| Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key.