cryptography   23958

« earlier    

[1710.08403] Constrained ternary integers
An integer n is said to be ternary if it is composed of three distinct odd primes. In this paper, we asymptotically count the number of ternary integers n≤x with the constituent primes satisfying various constraints. We apply our results to the study of the simplest class of (inverse) cyclotomic polynomials that can have coefficients that are greater than 1 in absolute value, namely to the nth (inverse) cyclotomic polynomials with ternary n. We show, for example, that the corrected Sister Beiter conjecture is true for a fraction ≥0.925 of ternary integers.
number-theory  cryptography  prime-numbers  elliptic-curves  nudge-targets  to-understand 
8 hours ago by Vaguery
Security in Offline First Apps – Offline Camp – Medium
At Offline Camp I participated in a session on security of Offline First web apps. We were able to pick out a couple different areas where security would be an issue for Offline First apps. Imagine a…
pouchdb  offline  cryptography 
yesterday by mac
ECDSA is not that bad: two-party signing without Schnorr or BLS
I already wrote about Schnorr and BLS signatures and I think they are really great. One of the most exciting properties of these signature schemes is key aggregation — if we want to make a 2-of-2 multisignature address we just take our public keys and add them together. via Pocket
IFTTT  Pocket  aggregated  cryptography  ecdsa  encryption 
2 days ago by ChristopherA
bitwarden
Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
password  security  cryptography  opensource 
3 days ago by LaptopHeaven
Why I Don't Recommend Scrypt | ircmaxell's Blog
A blog about PHP, Security, Performance and general web application development.
cryptography  scrypt  password  cypher  hash  storage  development 
3 days ago by vrobin
Cryptology ePrint Archive: Report 2018/962 - Zexe: Enabling Decentralized Private Computation
Interesting use of zcash protocol for arbitrary computation purposes. Might enable a distributed exchange
Zcash  protocol  zero  knowledge  proof  algorithm  cryptography  research  computer  science 
3 days ago by asteroza
Layman's Guide to Elliptic Curve Digital Signatures
In preparation for this post, I’ve read several research papers, a book, listened to 4 university lectures, idled away hours on IRC, developed elliptic curve libraries in 2 seperate languages, and built my own elliptic curve graphing framework. Elliptic curve cryptography is hard to wrap your head around. As one of the fundamental crypto systems making Bitcoin a “crypto”-currency, I really wanted to understand the underlying technical aspects which make this form of cryptography secure. This post is an attempt to demystify the elliptic curve digital signing algorithm which underlies bitcoin’s psuedo-anonymous identity system.

https://web.archive.org/web/20181014132725/https://royalfork.org/2014/09/04/ecc/
https://archive.is/cow5T
cryptography  encryption  theory 
5 days ago by coffeebucket

« earlier    

related tags

++  1982  2masto  aggregated  algorithm  algorithms  android  apple  article  authy  bitcoin  block  blockchain  blogs  book  books  bsd  cartoon  chain  chat  clockchain  cloudflare  coding  communication  computation  computer  computer_science  computing  config  crypto  cryptocurrency  csprng  currency  cybersecurity  cypher  data  decentralization  declassified  design  development  devops  didactic  discussion  distribution  ecdsa  economics  elixxir  elliptic-curves  encryption  engineering  entropy  files  finance  future  generator  git  golang  goodwatch  gpg  haha  hardening  hash  hashids  hashing  history  howto  http  https  hwrng  identity  ifttt  illustration  inbox  intelligence  internet  it-security  java  jiwan  knowledge  learn-with-errors  legal  library  linklist  lobsters  lolbuttcoin  lwe  markets  mathematics  meetup  mpc  network  networking  networks  nisschool  nsa  nudge-targets  number-theory  number  offline  one  openbsd  opensource  openssh  otp  pad  papers  password  pki  pocket  post-quantum  postwar  pouchdb  prime-numbers  privacy  prng  programming  proof  protocol  public-key  puzzle  python  quantum-computing  quantum  quantum_computing  quantumcomputing  radio  randum  readlater  rec:@tqbf  reference  research  rng  roughtime  rsa  rust  science  scrypt  securitate  security  sharing  siderand  signing  simple  snark  speculation  ssb  ssh  ssl  storage  sweden  swift  sysadmin  tech  technology  theory  time  tls  to-understand  tools  totwitter  tutorial  twilio  unitedstates  useful  uuids  verification  visualization  war  web  webcomic  wireless  work  xkcd  zcash  zero-knowledge-proofs  zero 

Copy this bookmark:



description:


tags: