Mathematical Foundations For Cryptography: Part IIIIn part II of this series, we looked at how two entities could share a secret in a public space using a key exchange. In this final part…Feb 12, 2021Feb 12, 2021
Mathematical Foundations for Cryptography: Part IIIn part I of this series, we introduced the idea of a cipher for encrypting and decrypting text between two entities. We now continue with…Feb 12, 2021Feb 12, 2021
Introducing the Policy Difference EngineAn introduction to modeling legislation with Rules as CodeNov 27, 2020Nov 27, 2020