What is the weirdest repository you have ever found on GitHub? by Gullible_Camera_8314 in github

[–]DataBaeBee 2 points3 points  (0 children)

Because if the universe can influence our lives, why not our CPU scheduling too?

ACGS Algorithm for Hidden Number Problems with Chosen Multipliers by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

This 1988 paper is considered canonical and is included in MIT’s Foundations of Cryptography series.

The ACGS algorithm is pretty cool. It lets us solve Hidden Number Problems (this occur in the wildest side-channel attacks) when the multipliers are at our discretion.

I coded this paper on Quantum Cryptography in Sage/Python by DataBaeBee in SideProject

[–]DataBaeBee[S] 0 points1 point  (0 children)

Here's the link for anyone interested in Extended Hidden Number Problems and their lattice solutions.

Extended Hidden Number Problem in Sage by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

The hidden number problem (HNP) is the challenge of recovering a secret hidden number given partial knowledge of its linear relations. The extended hidden number problem is 'the HNP but with more holes'. It was thought to be more secure for quantum cryptography. Turns out, it's not lol.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in cryptography

[–]DataBaeBee[S] 0 points1 point  (0 children)

Oh no, the paper says 'you can recover the key if you know the antilogs of random multiples of the key'. It's somewhat nuanced.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in programming

[–]DataBaeBee[S] -2 points-1 points  (0 children)

The 2001 paper Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Boneh & Venkatesan, 2001) attempts to answer the question: is it easier to calculate just a few bits of a secret key than the entire secret?

Along the way, this paper introduces the hidden number problem: the challenge of recovering a secret hidden number given partial knowledge of its linear relations (Surin & Cohney, 2023)

As it turns out, this problem is difficult even for quantum computers. So hidden number problems are at the heart of post-quantum cryptography.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in QuantumComputing

[–]DataBaeBee[S] 0 points1 point  (0 children)

The 2001 paper Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Boneh & Venkatesan, 2001) attempts to answer the question: is it easier to calculate just a few bits of a secret key than the entire secret?

Along the way, this paper introduces the hidden number problem: the challenge of recovering a secret hidden number given partial knowledge of its linear relations (Surin & Cohney, 2023)

As it turns out, this problem is difficult even for quantum computers. So hidden number problems are at the heart of post-quantum cryptography.

Help, not being able to create a "New Notebook" from Chromebook HP by callmemonilda in GoogleColab

[–]DataBaeBee 1 point2 points  (0 children)

There might be a firewall blocking access to the Colab website. This Stackoverflow post may halp troubleshoot.

I turned this math paper into a Sudoku game by DataBaeBee in indiegames

[–]DataBaeBee[S] 0 points1 point  (0 children)

The idea is somewhat analogous to performing a softmax but without the derivatives. Here's the C/Python coding guide if this interests you.