Skip to content
🎉 Welcome! Enjoy your reading, and I hope you will learn something new.

Cryptography

Message-Digest 5 (MD5)

Secure Hash Algorithm 1 (SHA-1)

Password Cracking

DHKE Attacks

ElGamal Attacks

RSA Attacks

Cipher block chaining (CBC)

Cipher feedback (CFB)

Cryptography

Counter (CTR)

Diffie–Hellman Key Exchange

Discrete Logarithm Problem (DLP)

Electronic codebook (ECB)

Elliptic-curve cryptography

Elliptic Curve DSA (ECDSA)

ElGamal

Encodings

Galois/counter (GCM)

Infinite Garble Extension (IGE)

Lattices

Linear Congruential Generator

Linear-Feedback Shift Register

Modular Arithmetic

Mersenne Twister (MT19937)

NTRU

Number Theory

Output feedback (OFB)

Post-quantum Cryptography

Public Key Cryptography

Random Number Generators

RSA Cryptosystem

Zero-Knowledge Proof (ZKP)