This video was really helpful in my understanding of the RSA broadcast attack! Thank you Bill! :)
@RazDorNV29 күн бұрын
amazing explanation. thank you!
@frankdelahue9761Ай бұрын
Internet can be very unforgiving place and that's why privacy and anonymity are important. Like Bruce said in his book "Data and Goliath"; "forgetting is forgiving". Erasing embarrassing posts prevents them from affects your future.
@frankdelahue9761Ай бұрын
Justine Sacco learned all this in a hard way.
@MuscleTeamOfficialАй бұрын
thank you for making this available to us plebs Bill
@johnwilson3918Ай бұрын
Loved this. Thank you for sharing.
@scottishpotatoes5911Ай бұрын
this is very helpful!
@AlgoNudgerАй бұрын
Math + CS = Lamport? 😂
@ScarthanosaurusАй бұрын
This IS the interview between two legends that we all needed. Love how humble DJB is and the motivation of curiosity. Thank you!
@irgendwerjokerАй бұрын
I knw. Humbleness is what DJB is known for.
@qassimm82092 ай бұрын
thank you Dr
@yeahweburnstuff2 ай бұрын
Just finished listening. Ted sounds like a really genuine and grounded person. Enjoyed this interview a lot.
@yeahweburnstuff2 ай бұрын
Hi Bill! Remember the painting of the Sator square? Today I heard a very plausible theory that it describes LNER tech. As an electrical engineer I'm certain this would be interesting to you. There's an amazing group of people on yt that are experimenting with low energy tech in their sheds! Amazing stuff. Blessings to you and the family. A
@ksaravanan72972 ай бұрын
Oh My God, I finally understood how group theory connects to Diffie Hellman! Thank you so much!
@forheuristiclifeksh78362 ай бұрын
1:05:30
@_BUIVANTUAN2 ай бұрын
Sorry it doesn't work, can you check again for me?
@gamegamega42 ай бұрын
Gracias profesor por su contenido y su pagina web es muy util, saludos desde Peru 🇵🇪
@NLPexperts2 ай бұрын
Great video can you do one about precalculation for rsa/diffie hellman decryption or generating 1024 bit primes? Or prime reuse?
@NLPexperts2 ай бұрын
Great but can you not teach with an etchasketch? Perhaps use a notepad or notepad. When you say 1024 bit prime does that mean prime numbers that are exactly 1024 bits in length or can it be less or more ?
@papaa49182 ай бұрын
damn bitcoins ecdsa
@TheDeclancox2 ай бұрын
Indeed! How prescient they were as was this gentleman kzbin.info/www/bejne/kHSyeHmJrNd6hMU
@ranjithmkumar3 ай бұрын
You are the best, Sir
@yeahweburnstuff3 ай бұрын
Bill, this makes me so sad! What can we do? Are we lost?
@pavithrabasappa3853 ай бұрын
sir can you please provide example using RLWE based BGV scheme
@rami-majdoub3 ай бұрын
underrated channel
@gmailgmail0123453 ай бұрын
I think this channel is heaven for cryptographers.
@pranavsingh-qz9vt3 ай бұрын
Well that counts some of the good explanation available
@Arthur-cx1cg3 ай бұрын
Thank you!
@gmailgmail0123453 ай бұрын
this interview is very much informative for new cipher designers.
@TheJacob20303 ай бұрын
Awesome
@AlgoNudger3 ай бұрын
Relying on brain, thats the key! 😊
@makichii23413 ай бұрын
thank you
@badretdyn4 ай бұрын
thanks, dude
@juncyo17884 ай бұрын
Can you explain how to calculate the inverse of “x+1” that “(x+1)^{-1} = x^3+x^2+x”?
@BillBuchanan4 ай бұрын
asecuritysite.com/gf/poly_2
@user-px6qm9ns6x4 ай бұрын
I have not managed to set the connection via usb(
@Ryan-xq3kl4 ай бұрын
whit is the most vibrant of all cryptographers ive ever listened too and i love it
@laxmiprasadoli59894 ай бұрын
Greate Video! Thanks a lot :)
@saeedjalali73394 ай бұрын
Thanks for creating these unique videos. first year in college and decided to learn cryptography and you have tons of videos about it.
@Ryan-xq3kl4 ай бұрын
his website is great too
@typingcat4 ай бұрын
OMG, you're Thunderf00t!
@aspidistrax_x27224 ай бұрын
Thank you so much. Ur videos really help me❤
@aspidistrax_x27224 ай бұрын
Thank u so much. I finally got asymmetric lwe
@qassimm82094 ай бұрын
thanks
@yeahweburnstuff4 ай бұрын
😅 Bruce is so blunt and to the point! Very entertaining to watch; I'd love to chat to him at dinner and see him really let loose!
@yeahweburnstuff4 ай бұрын
Hi Bill! Great to see you going strong!
@kebman4 ай бұрын
Ok, so the ed25519 algorithm is basically EdDSA?
@kebman4 ай бұрын
I just found your website! Thank you so much!
@shrameesrivastav11305 ай бұрын
For, e(x·G1, x·G2) · e(G1, -x·G2) · e(G1, 42·G2) = 0 Not sure if we can obtain -x·G2 from x·G2... So the second pairing could instead be e( -1·G1, x·G2) PS, in mod arithmetics, -1*G1 would just be <Order - 1>*G1 Can someone clarify if -1G1 should be <Field - 1> instead?