Problem: Given a pair of public and private RSA keys, factor N into p and q. Continue reading
Problem: Modular exponentiation. Continue reading
This post will cover the definitions of encryption schemes Diffie-Hellman, Textbook RSA, RSA-OAEP, and ElGamal. Continue reading
This post will cover the definitions of IND-CPA and IND-CCA. Continue reading
This is an overview of “modern” (post-WW2) cryptography covering some properties and cryptographic primitives. Definitions and proofs omitted.
On lines 8-10 of page 288 of Logic in Computer Science 2nd Edition by Michael Huth and Mark Ryan it says: Continue reading
Regression to the mean is not some magical force that forces everyone to become mediocre over time. Continue reading