Hill cipher is a kind of a block cipher method. Actually, it was the first one appearing in the history. … More
Tag: python
Random Initialization in Neural Networks
Neural networks requires to apply several state-of-the-art techniques such as choice of activation function, or network design to push their … More
How Vectorization Saves Life in Neural Networks
Developers tend to handle problems with conditional statements and loops. This is the number one topic of developers and data … More
A Step By Step Bitcoin Address Example
A money transfer transaction must include sender and receiver account information and transaction amount. On the other hand, a bitcoin … More
Counting Points on Elliptic Curves over Finite Field: Order of Elliptic Curve Group
ECDSA enables to produce signatures faster. Besides, its both signatures and keys are much smaller than adopted alternative options offering … More
Elegant Signatures with Elliptic Curve Cryptography
Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this … More
Moving Numbers To Upside Down: Extended Euclidean Algorithm
You might be familiar with the upside down if you watched Netflix series Stranger Things. Eleven shows the underside of … More
Handwritten Digit Classification with TensorFlow
If Exclusive OR (XOR) implementation were a letter A of the alphabet, then handwritten digit classification from MNIST database would … More
Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems
You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the … More