Explore >> Select a destination


You are here

rot256.dev
| | deut-erium.github.io
3.9 parsecs away

Travel
| | Himanshu Sheoran deut-erium deuterium cryptography Capture The Flag CTF hacking cybersecurity SAT SMT solvers and computer science
| | andrea.corbellini.name
2.4 parsecs away

Travel
| | [AI summary] This technical blog post explains the mathematical principles, key generation, and implementation details of Elliptic Curve Cryptography (ECC) covering domain parameters, verifiably random curves, ECDH key exchange, and ECDSA signatures.
| | hacks.esar.org.uk
4.6 parsecs away

Travel
| |
| | www.jeremykun.com
23.1 parsecs away

Travel
| This post assumes working knowledge of elementary number theory. Luckily for the non-mathematicians, we cover all required knowledge and notation in our number theory primer. So Three Thousand Years of Number Theory Wasn't Pointless It's often tough to come up with concrete applications of pure mathematics. In fact, before computers came along mathematics was used mostly for navigation, astronomy, and war. In the real world it almost always coincided with the physical sciences.