5861135 days ago8 minProgramming Modular Arithmetic for Cryptography (Part 2)Outline Modular Arithmetic Modular Multiplication Modular Multiplicative Inverse (Its Modular Division) Greatest Common Divisor Algorithm...
586113Jun 108 minProgramming Modular Arithmetic for Cryptography (Part 1)Who Is This For? For anyone interested in learning how to source code audit a cryptographic API or must use a pre-existing...
Tanveer SalimJun 210 minRules to Defend Against Fault and Power Analysis AttacksIntroduction to Rules to Defend Against Fault Injection and Power Analysis Attacks In the last blog post I discussed techniques to defend...
586113May 250 minTiming Attack DefensesWhat techniques exist to ensure programs are constant-time against timing attacks? Read this blog post to find out.