I’ve visited Venice at the end of the 2016 January to attend an event. I would like to share the post…
Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems
You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the…
From Korean War To Data Science and Analytics
I’ve found out about dog fights in Top Gun for the first time. Surprisingly, challenging story about a dog fight strategy developed by…
Big Data and Analytics Summit 2016 Impressions
I’ve attended Oracle Big Data and Analytics Summit 2016, Istanbul last week. I would like to share my impressions and the key…
Double and Add Method
Computing a new point on an elliptic curve Q = kP for given k and P could be performed by combination…
The Math Behind Elliptic Curves in Koblitz Form
In the previous post, we’ve mention the math behind addition law for elliptic curves over Galois Field GF(p) – prime…
The Math Behind Elliptic Curves in Weierstrass Form
The most of cryptography resources mention elliptic curve cryptography, but they often ignore the math behind elliptic curve cryptography and…