|
You are here |
www.micah.soy | ||
| | | | |
paragonie.com
|
|
| | | | | A human-readable overview of commonly misused cryptography terms and fundamental concepts. | |
| | | | |
www.cesarsotovalero.net
|
|
| | | | | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet. | |
| | | | |
quantumloom.in
|
|
| | | | | A simple guide to how cryptography keeps your digital stuff safe-from secret codes to secure messages. | |
| | | | |
xorshammer.com
|
|
| | | Nonstandard Analysis is usually used to introduce infinitesimals into the real numbers in an attempt to make arguments in analysis more intuitive. The idea is that you construct a superset $latex \mathbb{R}^*$ which contains the reals and also some infinitesimals, prove that some statement holds of $latex \mathbb{R}^*$, and then use a general "transfer principle"... | ||