Skip to content

  • Twitter

  • Youtube

  • GitHub

  • Linkedin

  • Facebook

  • Instagram

  • RSS

  • Mail

Sefik Ilkin Serengil

Code wins arguments

  • Home
  • About Me
  • Publications
  • Courses
  • Talks
  • Consultancy

Category: Cryptography

Solving Elliptic Curve Discrete Logarithm Problem

Elliptic curve cryptography is powerful. Calculating public key from known private key and base point can be handled easily. On … More

bitcoin, blockchain, discrete logarithm, elliptic curve

Counting Points on Elliptic Curves over Finite Field: Order of Elliptic Curve Group

ECDSA enables to produce signatures faster. Besides, its both signatures and keys are much smaller than adopted alternative options offering … More

bitcoin, elliptic curve, python

Elegant Signatures with Elliptic Curve Cryptography

Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this … More

audrey hepburn, bitcoin, elliptic curve, Java, marilyn monroe, python

New Generation Cryptocurrency

The British newspaper announced that a man who bought 27$ of bitcoin in 2009 would recall this investment in 2013 … More

altcoin, bitcoin, cryptocurrency

Signing Contents Digitally: An Email Implementation

“I was happy when I design my own signature. Also, deciding to put my signature under this job makes me … More

crypto, hash, Java, md5, public key, rsa, sha

Exchanging Encrypted Mails

2016 released Snowden is a biographical movie fictionalised life story of Former NSA employee Edward Snowden. The movie reveals illegal surveillance techniques of the government organization. Also, … More

aes, crypto, email, Java, rsa, snowden

Protecting Java Codes: Encrypted Class Loader

Cloud services are adopted by both start-ups and enterprises in recent years. However, it comes security issues. At this point, … More

a beautiful mind, aes, crypto, Java

Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems

You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the … More

diffie hellman, elliptic curve, key exchange, python

Double and Add Method

Computing a new point on an elliptic curve Q = kP for given k and P could be performed by combination … More

addition law, binary method, double and add method, elliptic curve, Java

The Math Behind Elliptic Curves in Koblitz Form

In the previous post, we’ve mention the math behind addition law for elliptic curves over Galois Field GF(p) – prime … More

addition law, binary field, elliptic curve, koblitz

Posts navigation

Older posts
Newer posts


Licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License

You can use any content of this blog just to the extent that you cite or reference

Subscribe to sefiks.com to stay up-to-date with latest posts

🎭 DeepFace is THE BEST facial recognition library for Python 🐍 It wraps many cutting-edge models that reaches and passes human-level accuracy 💪


BTW, Haven't you subscribe to my YouTube channel yet?