Bo Lin

Topics on cryptography and security

▼
Thursday, 17 July 2025

Post Quantum Cryptography

›
The consensus is that quantum computers will be built, and RSA and ECC will be broken by  Shor's algorithm  at some point. Although sc...
Sunday, 14 January 2024

Some critical publications on Quantum Computing

›
There are many news and publications on the advance of quantum computers, but there are some critical viewpoints. It's very difficult to...
Thursday, 4 January 2024

On ZKP - Zero-Knowledge Proof with Worked Examples

›
  On ZKP - Zero-Knowledge Proof with Worked Examples
Saturday, 4 March 2023

Understanding Side Channel Attacks - a Mind Process

›
  https://drive.google.com/file/d/1McEW87iTr4-dIDaCABTWuZYve7-lhLxN/view?usp=sharing
Sunday, 8 November 2020

A surprise rediscovery of a manuscript on the correctness proof of the Barrett algorithm

›
Life is a chance encounter, full of surprises. 😄 During  my first RSA endeavor , I not only missed the Montgomery algorithm, but also misse...
Saturday, 4 July 2020

Montgomery Multiplication - worked numerical examples

›
1. Montgomery multiplication 1.1. Single-precision Montgomery multiplication 1.1.1. Description Montgomery multiplication works o...
›
Home
View web version

About Me

Bo LIN
View my complete profile
Powered by Blogger.