Alessandro VisintinHow to encrypt a message using a stickAncient Greeks developed an unusual method to encrypt sensitive messages.Dec 28, 20224Dec 28, 20224
Alessandro VisintinA birthday in scarlet for cryptographyThe Birthday paradox is an intriguing brain teaser that has put worldwide cryptographers through the wringer.Dec 20, 2022Dec 20, 2022
Alessandro VisintinThe fascinating story behind the calculation of 𝝿The constant 𝝿 is everywhere. However, not everyone knows the intricate path that led us to its precise quantification.Dec 15, 20222Dec 15, 20222
Alessandro VisintinBuilding a simple Merkle tree class in PythonMerkle trees are a hot topic in computer science. Discover how they work and how to implement one from scratch.Dec 10, 2022Dec 10, 2022
Alessandro VisintinAn introduction to hash functions for cryptographic gourmetHash functions are a ubiquitous component of modern cryptography. Here is a gentle introduction for connoisseurs (and not only).Dec 6, 2022Dec 6, 2022
Alessandro VisintinWhy most explanations of the Monty Hall problem are (partially) wrongThe Monty Hall problem has plenty of intuitive explanations. They are correct, but shallow. Here is why.Aug 31, 20223Aug 31, 20223
Alessandro VisintinProtective MACs for the pouring rain of cryptographic banditsAn encrypted message requires an additional procedure to guarantee the integrity of the transmitted text.Aug 26, 2022Aug 26, 2022
Alessandro VisintinThe best way to encrypt a book using modern cryptographyOnce in a lifetime, we all get stuck while choosing the encryption mode to protect our books’ privacy.Aug 21, 20222Aug 21, 20222
Alessandro VisintinThe quest for true randomnessComputer scientists had to deal with the millenary problem of finding a source of true randomness. Here is what they discovered.Aug 16, 20227Aug 16, 20227