|
You are here |
neilmadden.blog | ||
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective. | |
| | | | |
rog3rsm1th.github.io
|
|
| | | | | The Okamoto-Uchiyama cryptosystem is a semantically secure, asymmetric encryption algorithm. It was first introduced in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The method is additive-homomorphic, which means that the plaintexts are added by multiplying two ciphertexts. It is therefore not necessary to decrypt the ciphertexts in order to be able to operate on the plaintexts. While searching for implementations of this algorithm on github, I realized that there were only two rough implementations. | |
| | | | |
paragonie.com
|
|
| | | | | A human-readable overview of commonly misused cryptography terms and fundamental concepts. | |
| | | | |
berty.tech
|
|
| | | Digital Signatures The digital signature (sometimes called an electronic signature) isn't a literal digitalized signature. In layman's terms, it is a procedure that guarantees the integrity and the authenticity of digital documents and messages. The name of a digital signature comes from the analogy with the handwritten signature of a paper document. Everyone knows that there is a lot of paperwork in the world of business. And, where there is paperwork, there is a lot of validation, approvals, etc. | ||