Skip to content

Covering computer security: cryptography and network security

Notifications You must be signed in to change notification settings

aim97/Computer-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Computer-security

Covering topics from understanding cryptography book

  • Ch7: The RSA cryptosystem
  • Ch8: Public key cryptography based on Discrete Logarithm Problem
  • Ch9: Elliptic Curve Cryptosystems
  • Ch10: Digital Signature
  • Ch11: Hash functions
  • Ch12: Message Authentication Codes
  • Ch13: Key Establishment
  • Math
    • Summary
      • Euler phi Function
      • Fermat's little theorem
      • Euler theorem
      • finding inverse with extended euclidean algorithm
      • Group Theory
      • Elliptic Curve groups
    • Group Theory
    • Finding Inverse with Extended Euclidean Algorithm