Practical-Cryptography-for-Developers-Book
Practical-Cryptography-for-Developers-Book copied to clipboard
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatu...
Hi Svetlin, First of all, thanks for writing this book. I’ve been only reading the chapter “Asymmetric Key Cipher”, but already learned a lot. And I think it’s easy to...
Great write ups! I'd love to see a section on the Schnorr Signature Algorithm. Would be a good lead up to EdDSA, since that's based on Schnorr.
Under the "How does it work" section, it says: > P1 = s * G = (r + h * privKey) mod q * G = r * G +...
Hello, there are some confusions in chapter [Secure Hash Algorithms](https://github.com/nakov/Practical-Cryptography-for-Developers-Book/blob/master/cryptographic-hash-functions/secure-hash-algorithms.md#other-secure-hash-functions) See SM3 algorithm under section "Other Secure Hash Functions", there are bold style applied around "Chinese goverment". What does the...
FR: Pdf
Hi Is it possible to offer the pdf version for download? thanks
The sample **interactive login** example has parameters for 16 MiB but incorrectly describes RAM used as 2 MB. MB/GB units of memory are used, but the correct representation is MiB...
There was a small typo in the text from: /key-exchange/diffie-hellman-key-exchange.md Line: 7 "so that IS someone sniffs the communication between the parties, the information exchanged CAN be revealed" Changed to:...
I would suggest to include google tink to the recommended libraries: https://github.com/google/tink Great work!
The second paragraph reads: > DHKE was one of the first public-key protocols, which allows two parties to exchange data securely, so that is someone sniffs the communication between the...