586113Jul 158 min readMulti-Precision ArithmeticThis is an introduction to Multi-Precision Arithmetic for programming cryptography in constant-time. There is no concern for speed.
586113Jun 248 min readProgramming Modular Arithmetic for Cryptography (Part 2)Outline Modular Arithmetic Modular Multiplication Modular Multiplicative Inverse (Its Modular Division) Greatest Common Divisor Algorithm...
586113Jun 108 min readProgramming Modular Arithmetic for Cryptography (Part 1)Who Is This For? For anyone interested in learning how to source code audit a cryptographic API or must use a pre-existing...
Tanveer SalimJun 210 min readRules to Defend Against Fault and Power Analysis AttacksIntroduction to Rules to Defend Against Fault Injection and Power Analysis Attacks In the last blog post I discussed techniques to defend...
586113May 250 min readTiming Attack DefensesWhat techniques exist to ensure programs are constant-time against timing attacks? Read this blog post to find out.
586113May 129 min readModes of AES for ConfidentialityHow do you protect privacy using Advanced Encryption Standard. Read this blog to discover the modes of encryption that do just that.
586113May 911 min readUses of Cryptography on the InternetHow is cryptography used to protect our privacy on the Internet? Read to find out some of the technology used to do so.
586113May 57 min readEssential Books for Programming Cryptography as a NoviceStart your journey in programming cryptography.