Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this … More
Category: Cryptography
New Generation Cryptocurrency
The British newspaper announced that a man who bought 27$ of bitcoin in 2009 would recall this investment in 2013 … More
Signing Contents Digitally: An Email Implementation
“I was happy when I design my own signature. Also, deciding to put my signature under this job makes me … More
Exchanging Encrypted Mails
2016 released Snowden is a biographical movie fictionalised life story of Former NSA employee Edward Snowden. The movie reveals illegal surveillance techniques of the government organization. Also, … More
Protecting Java Codes: Encrypted Class Loader
Cloud services are adopted by both start-ups and enterprises in recent years. However, it comes security issues. At this point, … More
Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems
You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the … More
Double and Add Method
Computing a new point on an elliptic curve Q = kP for given k and P could be performed by combination … More
The Math Behind Elliptic Curves in Koblitz Form
In the previous post, we’ve mention the math behind addition law for elliptic curves over Galois Field GF(p) – prime … More
The Math Behind Elliptic Curves in Weierstrass Form
The most of cryptography resources mention elliptic curve cryptography, but they often ignore the math behind elliptic curve cryptography and … More