|
You are here |
rot256.dev | ||
| | | | |
deut-erium.github.io
|
|
| | | | | Himanshu Sheoran deut-erium deuterium cryptography Capture The Flag CTF hacking cybersecurity SAT SMT solvers and computer science | |
| | | | |
andrea.corbellini.name
|
|
| | | | | [AI summary] This technical blog post explains the mathematical principles, key generation, and implementation details of Elliptic Curve Cryptography (ECC) covering domain parameters, verifiably random curves, ECDH key exchange, and ECDSA signatures. | |
| | | | |
hacks.esar.org.uk
|
|
| | | | | ||
| | | | |
www.jeremykun.com
|
|
| | | This post assumes working knowledge of elementary number theory. Luckily for the non-mathematicians, we cover all required knowledge and notation in our number theory primer. So Three Thousand Years of Number Theory Wasn't Pointless It's often tough to come up with concrete applications of pure mathematics. In fact, before computers came along mathematics was used mostly for navigation, astronomy, and war. In the real world it almost always coincided with the physical sciences. | ||