586113Jul 158 minMulti-Precision ArithmeticThis is an introduction to Multi-Precision Arithmetic for programming cryptography in constant-time. There is no concern for speed.
586113Jun 248 minProgramming Modular Arithmetic for Cryptography (Part 2)Outline Modular Arithmetic Modular Multiplication Modular Multiplicative Inverse (Its Modular Division) Greatest Common Divisor Algorithm...
586113Jun 108 minProgramming Modular Arithmetic for Cryptography (Part 1)Who Is This For? For anyone interested in learning how to source code audit a cryptographic API or must use a pre-existing...
Tanveer SalimJun 210 minRules to Defend Against Fault and Power Analysis AttacksIntroduction to Rules to Defend Against Fault Injection and Power Analysis Attacks In the last blog post I discussed techniques to defend...
586113May 250 minTiming Attack DefensesWhat techniques exist to ensure programs are constant-time against timing attacks? Read this blog post to find out.
586113May 129 minModes of AES for ConfidentialityHow do you protect privacy using Advanced Encryption Standard. Read this blog to discover the modes of encryption that do just that.
586113May 911 minUses of Cryptography on the InternetHow is cryptography used to protect our privacy on the Internet? Read to find out some of the technology used to do so.
586113May 57 minEssential Books for Programming Cryptography as a NoviceStart your journey in programming cryptography.