You are here |
blog.nuculabs.de | ||
| | | |
thomasbandt.com
|
|
| | | | Analyzing quantum computing's impact on cryptography, this post briefly discusses challenges in encryption and advances in post-quantum cryptography, emphasizing the race for quantum-resistant security. | |
| | | |
www.johndcook.com
|
|
| | | | The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview. | |
| | | |
blog.lambdaclass.com
|
|
| | | | Elliptic curves (EC) have become one of the most useful tools for modern cryptography. They were proposed in the 1980s and became widespread used after 2004. Its main advantage is that it offers smaller key sizes to attain the same level of security of other methods, resulting in smaller storage | |
| | | |
imapenguin.com
|
|
| | So far in this 7 part (shocked I've made it through 7!) series on doing weird things with Ciphers on old computers we've: Reversed a string Shifted bits left and right (mostly right) Brute forced a known simple cipher Channeled our inner John Connor by cracking ATM machines Searched through a large number looking for matches Learned how to use XOR to recover data Author's Note: This one stretched my skills quite a bit, but I kept it under 2000 words (by 89). I'm not sure when I started this I knew I'd be... |