diff options
author | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
---|---|---|
committer | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
commit | 6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21 (patch) | |
tree | bcab1e8a43ad78c5bcf4d4fafafc4014444b5dcf /docs/crypto/rsa.txt | |
parent | b70b491314e5e0fc36372608ab952fba5e0fdb8d (diff) | |
parent | 8711d4946213a87699e6a20f6cd1db57170bf523 (diff) | |
download | lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.tar.gz lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.zip |
Merge branch 'malf-bitsctf-2024'
* malf-bitsctf-2024:
RSA link to factordb
Consolidate forensics links and add FTKImager and volatility
BITSCTF 2024 results
Diffstat (limited to 'docs/crypto/rsa.txt')
-rw-r--r-- | docs/crypto/rsa.txt | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/docs/crypto/rsa.txt b/docs/crypto/rsa.txt index a047f07..f9442fc 100644 --- a/docs/crypto/rsa.txt +++ b/docs/crypto/rsa.txt @@ -41,3 +41,9 @@ To perform fast mod expo for encryption, use pow(plaintext, e, n) ... for decryption, use pow(cyphertext, d, n) To calculate mod inverse, use pow(e, -1, phi). + + + +Extras +------ +http://factordb.com/ |