So What’s A Finite Field and Why Is It So Important to your Privacy?

The demonstration of the methods defined in this article are here.

Sometimes when you read research papers your head can spin a little, but you should try and stick with it, as the learning of new knowledge often involves breaking down the barriers to that knowledge.

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Top Readings for InfoSec

Can I Use Distributed Key Generation (DKG) and ECDSA Signatures? Yes, with DKLS

3 A’s of Security

Understand SMPP Protocol

{UPDATE} Block Puzzle: Star Finder Hack Free Resources Generator

Secure Wallet Update: UI Redesign

{UPDATE} One to One Quiz Hack Free Resources Generator

{UPDATE} Clash on the Moon RTS Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Moving secrets from a war zone: Keyless SSL

Thank you to Adrien-Marie Legendre and Carl Gustav Jacob Jacobi for their symbols

Proxy Re-Encryption — Allowing Alice To Share Her Protect Secret Key With Bob