Cryptography 101 - Mathematical Basis (II) - Modular exponentiation
Second post of the Cryptography 101 course I am writing. In this post you will learn how to compute Modular exponentiation
Second post of the Cryptography 101 course I am writing. In this post you will learn how to compute Modular exponentiation
First post on Cryptography basis, this series is inspired by a course on cryptography I took at my University
In this article we will talk about the existing different techniques from pattern recognition and how they can be used with biometric data.
Best practices to create and manage passwords & hardening your online presence