Diffie-Hellman with Zero-Knowledge Proof

Well. The Diffie-Hellman method has been around for nearly 50 years, and it is still going strong. It’s at the core many modern key exchange methods, such as ECDH (Elliptic Curve Diffie-Hellman), and you’ll find it on your connections to Google, your wi-fi connections to your corporate networks, and in the Tor protocol. And we can also use it to stop users sending their sensitive information (such as their passwords)…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Cap | Hack The Box | Write-up

Banner of Cap — Hack The Box

CyberTarot NFT on-chain random generation with Chainlink VRF

{UPDATE} Handris! Hack Free Resources Generator

Introduction to CSP and CORS

PBSO: Looking For This Man Accused Of Check Fraud

PBSO: Looking For This Man Accused Of Check Fraud

Pegasus: The Spyware Technology

In IoT, How Can We Represent Binary Data Objects and Integrate Security?

Tactics of an “Emotet” malware

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Proxy Re-Encryption — Allowing Alice To Share Her Protect Secret Key With Bob

One of the Greatest Cybersecurity Challenge in the Next Decade … Post Quantum Cryptography

What goes around, comes around again … Welcome, Code-based Cryptography

Finally Building a Solid (and Rusty) Foundation for the Internet