Все публикации

Trailer: introduction to cryptology

Authenticated key agreement

Blind signatures, undeniable signatures

KEM-DEM framework

Shamir secret sharing

Hardness of DLP, CDHP, DDHP

ElGamal encryption and signature

Example for BSGS

Diffie-Hellman key exchange

Baby-step giant-step attack

Attacks on RSA

Problems with schoolbook RSA III

Security notions for public-key cryptography

Problems with schoolbook RSA II

Chinese Remainder Theorem

Problems with schoolbook RSA I

Exponentiation

Schoolbook RSA

Block cipher

Modes of operation

Message Authentication Codes (MACs)

Hash functions

Stream ciphers: RC4 and others

welcome to shbcf.ru