Cryptography
The Fragility of Raw RSA: From Mathematical Elegance to Existential Forgery
Why textbook RSA preserves multiplicative structure and enables existential forgery, and how hash-then-sign and padding schemes like RSA-PSS close the gap.
Articles on cryptography, software verification, machine learning, and the supporting math.
Loading articles…
Cryptography
Why textbook RSA preserves multiplicative structure and enables existential forgery, and how hash-then-sign and padding schemes like RSA-PSS close the gap.
Cryptography
How Lagrange and Cauchy shape real-world DH and ECC groups, why nearly-prime cofactor curves trade purity for performance, and what Secure Scuttlebutt teaches about validation.
Cryptography
From Weierstrass curves and double-and-add to cofactor attacks and Dual_EC_DRBG—how subgroup geometry and implementation choices determine ECC trust boundaries.
Cryptography
A structured look at HNP-based key recovery, BIGNUM representation leaks, lazy resizing CVEs, and protocol-level subgroup failures in modern signature stacks.
Cryptography
Bridging prime-order proofs with cofactor reality: small-subgroup attacks, BIGNUM leaks, twist security, and a practical mitigation checklist for protocol engineers.
Cryptography
Why finite-field DLP hits a scalability wall, how ECC and Pollard rho change the cost curve, and a worked finite-field point arithmetic example on F23.
Cryptography
From Tamarin’s prime-order ideal to Scuttlebutt, Bluetooth P-256 invalid-point attacks, and OpenSSL lazy resize—how symbolic proofs miss implementation and protocol reality.
Cryptography
Discover the only mathematically unbreakable encryption method—and why its perfection makes it practically useless.
Cryptography
Discover the only encryption method proven to be mathematically unbreakable—and why its implementation is far more dangerous than it appears.
Cryptography
Explore why the natural numbers we use everyday are fundamentally unsuitable for encryption, and the mathematical traps that await those who don't understand fields.
Cryptography
Learn why encrypted data can still be tampered with and how block ciphers attempt to solve the fundamental problems of encryption.
Cryptography
Explore how the Hill Cipher's reliance on linear algebra made it vulnerable to high school math—and why pattern repetition destroyed the unbreakable Vigenère cipher.
Cryptography
Discover how the Symmetric Group—where elements are actions rather than numbers—forms the foundation of modern cryptographic security.
Cryptography
Trace the journey from the broken DES standard to the ironclad AES, and discover the algebraic foundations that make modern encryption possible.
Cryptography
Discover how the simplest mathematical field Z_2 with just 0 and 1 becomes the foundation for AES encryption through extension fields and irreducible polynomials.
Software Verification and Validation
Placeholder draft for a later lecture; the exact topic and structure will be filled in once the corresponding Canvas module is available.
Cryptography
Placeholder draft for a later lecture whose precise topic will be aligned with the Canvas modules and updated once materials are posted.
Software Verification and Validation
Stub post expanding the LangSmith hands-on work into a discussion of experiment design, observability, and how tooling supports verification efforts.
Cryptography
Stub lecture post introducing the core ideas of public-key cryptography, setting up later deep dives into RSA and related schemes.
Software Verification and Validation
Stub post introducing formal methods in , connecting mathematical reasoning to practical verification of real systems.
Cryptography
Stub lecture post on formalizing security goals and attack models in cryptography, bridging intuitive threats to precise definitions.
Software Verification and Validation
Stub post capturing the LangSmith tutorial and hands-on setup work from the modules, focusing on tooling for testing and observability.
Cryptography
Stub for a lecture post on block ciphers and common modes of operation, building on earlier symmetric encryption basics.
Software Verification and Validation
Stub post on writing precise specifications and requirements, a key prerequisite for formal verification and systematic testing.
Cryptography
Stub post for the mathematical foundations of modern cryptography, focusing on number theory concepts used later for public-key systems.
Software Verification and Validation
A stub post on core testing strategies in , from black-box and white-box testing to basic coverage criteria and test design heuristics.
Cryptography
A stub for the first deep-dive into symmetric encryption in , focusing on block ciphers, modes of operation, and basic threat models.
Software Verification and Validation
An overview of software testing in , covering why testing matters, core terminology, and how testing fits into the broader picture of verification and validation.
Cryptography
Course overview for Cryptography, outlining goals, logistics, and the foundational security concepts that will shape the rest of the semester.
Software Verification and Validation
Comprehensive guide to unit testing strategies, covering test case design, coverage metrics, mocking techniques, and best practices for writing maintainable test suites.
Cryptography
A deep dive into symmetric encryption algorithms, including block ciphers like AES and DES, stream ciphers, and their applications in modern cryptography.
General
An overview of Spring 2026 coursework in Cryptography and Software Verification and Validation: goals, themes, and how this blog supports the semester.
Software Verification and Validation
Exploring the fundamentals of software verification and validation, covering testing strategies, quality assurance techniques, and methods for building reliable software systems.
Cryptography
Exploring public key cryptography systems, including the RSA algorithm, Diffie-Hellman key exchange, and how asymmetric encryption enables secure communication without shared secrets.
Software Verification and Validation
Exploring integration testing methodologies and continuous verification practices, including test automation, CI/CD pipelines, and strategies for maintaining software quality throughout development.
Software Verification and Validation
An introduction to formal methods for software verification, including model checking, theorem proving, and mathematical techniques for proving program correctness.
Cryptography
An introduction to the fundamental concepts of cryptography, exploring how secure communication systems work and why they are essential in modern computing.
Cryptography
Understanding cryptographic hash functions, their properties, applications in data integrity verification, digital signatures, and password storage systems.
Logic for Computer Scientists
Worked guide for Logic for Computer Scientists Homework 3: scoping, inference proofs, CNF transformations, and predicate encodings.
Software Verification and Validation
A deep dive into SPIN model checker and Promela modeling language for verifying concurrent systems, with practical examples and verification workflows.
Cryptography
Exploring the theoretical foundations and practical implementation of zk-SNARKs—the cryptographic primitives enabling succinct, non-interactive proofs that verify computations without revealing inputs.
Software Verification and Validation
Introduction
Logic for Computer Scientists
A comprehensive review of advanced logic concepts including Hilbert Systems, the Tableaux Method, and Herbrand Semantics, showing how they feed into model checking with concrete transition-system examples.
Intelligent Systems
Upgrade the perceptron into a calibrated probabilistic classifier with logistic regression and its multiclass softmax extension, unpacking the sigmoid link, cross-entropy loss, gradient descent, and the bridge to mode...
Logic for Computer Scientists
Master Linear Temporal Logic (LTL) for specifying and verifying time-dependent properties of reactive systems, from safety invariants to liveness guarantees.
Intelligent Systems
Transition from probabilistic to discriminative models with the Perceptron algorithm, learning how linear classifiers use weighted features to make predictions and laying the foundation for neural networks.
Logic for Computer Scientists
Explore non-monotonic reasoning systems where new information can invalidate previous conclusions, from the classic Tweety the bird example to stable models in logic programming.
Intelligent Systems
Learn how to handle zero-frequency problems and overfitting in Naive Bayes through Laplace smoothing and understand the theoretical foundations of maximum likelihood estimation.
Logic for Computer Scientists
Learn how Herbrand semantics reduce the infinite complexity of first-order logic interpretations to finite, manageable models through ground atoms and the Herbrand base.
Intelligent Systems
Learn how Naive Bayes bridges probabilistic reasoning and machine learning, using conditional independence assumptions to build powerful classifiers for spam detection, digit recognition, and more.
Intelligent Systems
Learn how variable elimination dramatically reduces computational complexity in Bayesian network inference through strategic factor manipulation and elimination ordering.
Intelligent Systems
Master d-separation algorithms for determining conditional independence in Bayesian networks and understand the foundation of probabilistic inference.
Logic for Computer Scientists
An in-depth exploration of Hilbert proof systems and the Tableaux method for predicate logic, with detailed examples on quantifier manipulation and step-by-step proof construction.
Logic for Computer Scientists
Learn how the unification algorithm finds the most general unifier (MGU) that makes two terms identical, a fundamental operation in automated reasoning and logic programming.
Theory of Automata
Explore Thompson's Construction algorithm, the elegant method for converting regular expressions to NFAs that revolutionized pattern matching and influenced decades of Unix tools.
Intelligent Systems
Discover reinforcement learning—the paradigm where agents learn to maximize expected rewards through experience, from robot locomotion to DeepRacer vehicles.
Logic for Computer Scientists
Learn to analyze propositional formulas using truth tables and formation trees—essential tools for understanding logical structure and validity.
Logic for Computer Scientists
Master the fundamental building blocks of logical reasoning: propositions, truth values, and logical connectives that form the bedrock of computer science applications.
Logic for Computer Scientists
Discover how logic—the study of reasoning—forms the invisible foundation of every computer program, database query, and artificial intelligence system you build.
General
An introduction to this blog and what I plan to share about my journey in computer science and machine learning research.
Logic for Computer Scientists
An introduction to Prolog's unique declarative paradigm, exploring facts, rules, queries, and how logic programming differs from imperative approaches.
Theory of Automata
A comprehensive guide to understanding and applying the Master's Theorem for analyzing divide-and-conquer algorithms.
No articles match your search.