Alessandro VisintinHow to encrypt a message using a stickAncient Greeks developed an unusual method to encrypt sensitive messages.·4 min read·Dec 28, 2022--4--4
Alessandro VisintinA birthday in scarlet for cryptographyThe Birthday paradox is an intriguing brain teaser that has put worldwide cryptographers through the wringer.·5 min read·Dec 20, 2022----
Alessandro VisintinThe fascinating story behind the calculation of 𝝿The constant 𝝿 is everywhere. However, not everyone knows the intricate path that led us to its precise quantification.·5 min read·Dec 15, 2022--2--2
Alessandro VisintinBuilding a simple Merkle tree class in PythonMerkle trees are a hot topic in computer science. Discover how they work and how to implement one from scratch.·5 min read·Dec 10, 2022----
Alessandro VisintinAn introduction to hash functions for cryptographic gourmetHash functions are a ubiquitous component of modern cryptography. Here is a gentle introduction for connoisseurs (and not only).·5 min read·Dec 6, 2022----
Alessandro VisintinWhy most explanations of the Monty Hall problem are (partially) wrongThe Monty Hall problem has plenty of intuitive explanations. They are correct, but shallow. Here is why.·5 min read·Aug 31, 2022--3--3
Alessandro VisintinProtective MACs for the pouring rain of cryptographic banditsAn encrypted message requires an additional procedure to guarantee the integrity of the transmitted text.·6 min read·Aug 26, 2022----
Alessandro VisintinThe best way to encrypt a book using modern cryptographyOnce in a lifetime, we all get stuck while choosing the encryption mode to protect our books’ privacy.·5 min read·Aug 21, 2022--2--2
Alessandro VisintinThe quest for true randomnessComputer scientists had to deal with the millenary problem of finding a source of true randomness. Here is what they discovered.·5 min read·Aug 16, 2022--7--7