/Computer-security

Covering computer security: cryptography and network security

Computer-security

Covering topics from understanding cryptography book

  • Ch7: The RSA cryptosystem
  • Ch8: Public key cryptography based on Discrete Logarithm Problem
  • Ch9: Elliptic Curve Cryptosystems
  • Ch10: Digital Signature
  • Ch11: Hash functions
  • Ch12: Message Authentication Codes
  • Ch13: Key Establishment
  • Math
    • Summary
      • Euler phi Function
      • Fermat's little theorem
      • Euler theorem
      • finding inverse with extended euclidean algorithm
      • Group Theory
      • Elliptic Curve groups
    • Group Theory
    • Finding Inverse with Extended Euclidean Algorithm