Elliptic Curve Back Door Computerphile - Detailed Analysis
Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. Should Apple unlock a terrorists iPhone for the FBI? Professor Ross Anderson explains how this is a "Pandora's Box" situation. Blockchain is the underlying technology behind cryptocurrencies bringing together Merkle trees, Hashing & Distributed ... Professor Edward Frenkel discusses the mathematics behind the NSA Surveillance controversy - see links in full description.
Photo Gallery








