From Smooth to Dot-to-Dot … Meet The Curve That Protects Your Online Security Like No Other

You will find elliptic curves in so many areas of cybersecurity. In fact, the network connection you are using now is probably using them to generate the shared encryption key that your browser uses, and which is the same key that the same server. Everytime your connect, you both generate a new encryption key. We define this method as…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

Phishing using Kali Linux

Frozen King Techno NFT Giveaway| Latest NFT Giveaway

{UPDATE} Joker Nap HD Hack Free Resources Generator

Email Scam. WA Woman loses $750,000 in Real Estate deal.

5 Ways Targeted Phishing Scams Try To Hook You

{UPDATE} Poker Solitaire 5/9 Hack Free Resources Generator

Apps and cloud services you should use

{UPDATE} SnapSolve: voor Ruzzle Adventure, Ruzzle en Boggle Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

A Rusty Key: At The Core of Cybersecurity is Random Numbers

The Strange Tail of Nelson Mandela, The NSA and A Backdoor Cipher

The Rise and Rise of Encrypted Attacks, Ransomware, and … Watch Out for Rebate, Claim and Debt

In A World Of Privacy: The Time Has Come For Paillier Encryption To Step Forward