|
You are here |
www.blueraja.com | ||
| | | | |
blog.lambdaclass.com
|
|
| | | | | Introduction When working with cryptographic applications you need to understand some of the underlying math (at least, if you want to do things properly). For example, the RSA cryptographic system (which was one of the earliest methods and most widely adopted, until it lost ground to better methods, such as | |
| | | | |
corbettmaths.com
|
|
| | | | | The Ultimate GCSE Foundation Maths Revision Video and Booklet - Edexcel AQA OCR - Corbettmaths | |
| | | | |
kndrck.co
|
|
| | | | | Motivation RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and is different from the decryption key which is kept secret. If I wanted to comprehend zero knowledge proofs, then understanding the grand-daddy of public-key cryptosystems is a must. Background Maths Exponential Rules 1 $$ \begin{align} \label{eq:exponent_rule} g^{a-b} &= \dfrac{g^a}{g^b} \newline g^{a+b} &= g^a g^b \n... | |
| | | | |
anactofcommunication.wordpress.com
|
|
| | | One of the most notable trends in educational discussion over the last few years is the increased emphasis on the importance of memory. The brilliant work of groups like the Learning Scientistshas helped to bring ideas such as dual coding, interleaving and spaced practice into the educational mainstream. This has been sharpened by both the... | ||