Supersingular Isogeny Diffie-Hellman for Key Generation

A demonstration of Supersingular Isogeny Diffie-Hellman (SIDH) is here.


Key exchange is a fundamental part of security on the Internet. Every time we connect to our company VPN, or to an HTTPs site, we negotiate a key with the other side. Public key encryption or key exchange methods are normally used to generate the…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

{UPDATE} Orbital Chaos Hack Free Resources Generator

Frozen King Techno NFT Giveaway| Latest NFT Giveaway

MongooseIM 3.4: Designed with privacy in mind


On an Edinburgh Bus: A root certificate, a weak key, and SHA-1

CryptoForHealth: A Large Scale Attack on Twitter

Alibaba Cloud Xiao Li: Native Security Creates an Oasis on the Cloud

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

A Bluffer’s Guide To AES Modes … ECB, CBC, CFB, and all that jazz!

What’s At The Core of Cybersecurity on the Internet? Well, it probably includes ECDH

Key Distribution Generators using FROST and Kryptology