|
You are here |
www.blueraja.com | ||
| | | | |
blog.lambdaclass.com
|
|
| | | | | Introduction When working with cryptographic applications you need to understand some of the underlying math (at least, if you want to do things properly). For example, the RSA cryptographic system (which was one of the earliest methods and most widely adopted, until it lost ground to better methods, such as | |
| | | | |
kndrck.co
|
|
| | | | | Motivation RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and is different from the decryption key which is kept secret. If I wanted to comprehend zero knowledge proofs, then understanding the grand-daddy of public-key cryptosystems is a must. Background Maths Exponential Rules 1 $$ \begin{align} \label{eq:exponent_rule} g^{a-b} &= \dfrac{g^a}{g^b} \newline g^{a+b} &= g^a g^b \n... | |
| | | | |
corbettmaths.com
|
|
| | | | | The Ultimate GCSE Foundation Maths Revision Video and Booklet - Edexcel AQA OCR - Corbettmaths | |
| | | | |
www.interviewbit.com
|
|
| | | Explore our top 9 best data science courses online for 2024. Find the right course to boost your career in data science, from beginner to advanced levels. | ||