Explore >> Select a destination


You are here

www.jeremykun.com
| | dusty.phillips.codes
7.5 parsecs away

Travel
| | The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers.
| | wavewatching.net
11.4 parsecs away

Travel
| | A recent DefenseNews article again put Shor's algorithm front and center when writing about Quantum Computing. Yet, there is so much more to this field, and with Lockheed Martin working with...
| | blog.trailofbits.com
8.3 parsecs away

Travel
| | Here at Trail of Bits we review a lot of code. From major open source projects to exciting new proprietary software, we've seen it all. But one common denominator in all of these systems is that for some inexplicable reason people still seem to think RSA is a good cryptosystem to use. Let me save [...]
| | www.enov8.com
61.1 parsecs away

Travel
| Compliance management is one of the most important considerations in the enterprise, particularly for a CIO. Read more about it.