Tags:
Information Technology
Internet
Society and Environment
Non-fungible tokens (NFTs) are unique, digital items with blockchain-managed ownership. Examples include collectibles, game items, digital art, event tickets, domain names, and even ownership records for physical assets.
07-Jun-2019
Tags:
Information Technology
Family Tree is an Android application for maintaining family relationships.
20-Oct-2018
Tags:
Hardware
Information Technology
Erfahrungen mit der Dual Boot Installation von Ubuntu 18.04.
20-May-2018
Tags:
Mathematics
Information Technology
I present the mathematics behind the RSA public key cryptography.
17-May-2018
Tags:
Mathematics
Information Technology
I present the very basic concepts of modular arithmetic as they are needed in cryptography. Important topics are: congruences, Fermat's theorem and the Euler function.
15-May-2018
Tags:
Mathematics
Information Technology
Extended Euclidean algorithm computes the greatest common divisor of two numbers as well as the coefficients of the Bézout's idententity. This is used for computing the modulo inverse of a number and that is needed in public cryptography.
05-Apr-2018
Tags:
Mathematics
Information Technology
Diffie-Hellman Key Exchange is a protocol for establishing a shared secret key between two parties over an unsecure channel.
16-Feb-2018