|
You are here |
kndrck.co | ||
| | | | |
dusted.codes
|
|
| | | | | The beauty of asymmetric encryption - RSA crash course for developers | |
| | | | |
shrik3.com
|
|
| | | | | [AI summary] This post explains the RSA algorithm, its mathematical foundations, and applications in cryptography, including key generation, encryption/decryption processes, and security principles. | |
| | | | |
unorde.red
|
|
| | | | | [AI summary] This article explains the Diffie-Hellman key exchange algorithm, its mathematical foundation in discrete logarithm problems, and its security implications in modern cryptography. | |
| | | | |
www.jeremykun.com
|
|
| | | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key. | ||