Blogs

Public-Key Cryptography: Diffie-Hellman
Public-Key Cryptography: …

Public-Key Cryptography

Public-Key cryptography works by using pairs of mathematically related keys generated by cryptographic algorithms. These cryptographic algorithms are based on difficult ( one-way ) mathematical problems, such as the discrete logarithm assumption. In other words, the …

Reverse Engineering: An Introduction to Linkers
Reverse Engineering: An …

Learn about Linkers

Whether your interested in low-level development or reverse engineering malware, understanding how linkers work and being able to write your own linker script is an important skill.

I recently created a gitbook, that will elaborate on several important linker topics, such as: …