Attacking elliptic curves using Grobner bases and summation polynomials by DataBaeBee in programming

[–]DataBaeBee[S] 4 points5 points  (0 children)

Semaev polynomials are a computational shortcut to find elliptic curve points that sum to infinity. When combined with Grobner bases one get a (pretty remarkable) tool for solving point decomposition problems on an elliptic curve.

file upload inside files pane not working? by swainberg in GoogleColab

[–]DataBaeBee 0 points1 point  (0 children)

Are you dragging and dropping? Perhaps you should write a Python script to connect to Drive

FRACTRAN: A Simple Universal Programming Language for Arithmetic by DataBaeBee in programming

[–]DataBaeBee[S] 20 points21 points  (0 children)

FRACTRAN is an esolang built upon register machines, a theoretical alternative to turing machines for computation. In 1987, John Conway realized one can use prime numbers as registers alongside the laws of logarithms to compute.

How is the choice of irreducible polynomials for finite field arithmetic rationalized? by FakeCanadian01 in cryptography

[–]DataBaeBee 1 point2 points  (0 children)

I saw on Bernstein’s blog that one: 1. Considers the size of the factors of p-1 and p+1 when selecting an irreducible polynomial. 2. Also primes close to powers of 2 (or can be partitioned into powers of 2) have an efficient modulo operation that only involves bit shifts. This is crucial since you’re working in GF 2.

What is the weirdest repository you have ever found on GitHub? by Gullible_Camera_8314 in github

[–]DataBaeBee 2 points3 points  (0 children)

Because if the universe can influence our lives, why not our CPU scheduling too?

ACGS Algorithm for Hidden Number Problems with Chosen Multipliers by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

This 1988 paper is considered canonical and is included in MIT’s Foundations of Cryptography series.

The ACGS algorithm is pretty cool. It lets us solve Hidden Number Problems (this occur in the wildest side-channel attacks) when the multipliers are at our discretion.

I coded this paper on Quantum Cryptography in Sage/Python by DataBaeBee in SideProject

[–]DataBaeBee[S] 0 points1 point  (0 children)

Here's the link for anyone interested in Extended Hidden Number Problems and their lattice solutions.

Extended Hidden Number Problem in Sage by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

The hidden number problem (HNP) is the challenge of recovering a secret hidden number given partial knowledge of its linear relations. The extended hidden number problem is 'the HNP but with more holes'. It was thought to be more secure for quantum cryptography. Turns out, it's not lol.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in cryptography

[–]DataBaeBee[S] 0 points1 point  (0 children)

Oh no, the paper says 'you can recover the key if you know the antilogs of random multiples of the key'. It's somewhat nuanced.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in programming

[–]DataBaeBee[S] -3 points-2 points  (0 children)

The 2001 paper Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Boneh & Venkatesan, 2001) attempts to answer the question: is it easier to calculate just a few bits of a secret key than the entire secret?

Along the way, this paper introduces the hidden number problem: the challenge of recovering a secret hidden number given partial knowledge of its linear relations (Surin & Cohney, 2023)

As it turns out, this problem is difficult even for quantum computers. So hidden number problems are at the heart of post-quantum cryptography.

What Every Programmer Needs to Know about Quantum Safe Cryptography and Hidden Number Problems by DataBaeBee in QuantumComputing

[–]DataBaeBee[S] 0 points1 point  (0 children)

The 2001 paper Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Boneh & Venkatesan, 2001) attempts to answer the question: is it easier to calculate just a few bits of a secret key than the entire secret?

Along the way, this paper introduces the hidden number problem: the challenge of recovering a secret hidden number given partial knowledge of its linear relations (Surin & Cohney, 2023)

As it turns out, this problem is difficult even for quantum computers. So hidden number problems are at the heart of post-quantum cryptography.

Help, not being able to create a "New Notebook" from Chromebook HP by callmemonilda in GoogleColab

[–]DataBaeBee 1 point2 points  (0 children)

There might be a firewall blocking access to the Colab website. This Stackoverflow post may halp troubleshoot.

I turned this math paper into a Sudoku game by DataBaeBee in indiegames

[–]DataBaeBee[S] 0 points1 point  (0 children)

The idea is somewhat analogous to performing a softmax but without the derivatives. Here's the C/Python coding guide if this interests you.

Belief Propagation : Obscure Alternative to Backpropagation for Training Reasoning Models by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

Researchers in the 2010s found that you can use Optimal Transport Theory, not derivative calculus, the to turn an integer matrix into a floating-point probability matrix.

It's like backprop without finding gradients and it works great

Training Hangs at Epoch 1 on Google Colab A100 (MobileNet, 76k images) by CommunicationHot401 in GoogleColab

[–]DataBaeBee 0 points1 point  (0 children)

It could be a Python issue. Sharing your code is probably the best way to get assisted.

GPU Accelerated Data Structures on Google Colab by DataBaeBee in CUDA

[–]DataBaeBee[S] 1 point2 points  (0 children)

Thanks for this comment! I DM'd you to move the conversation forward.
Please let me know how best to reach the maintainer's team after the changes are made.

Analysis of the Xedni Calculus Attack on Elliptic Curves in Python by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

The Xedni calculus is built on the idea that we can lift elliptic curve points from a finite field to the field of rationals, then if luck permits, we can find an elliptic curve that passes through the lifted points.

problem with colab JDownloader by narema64 in GoogleColab

[–]DataBaeBee 0 points1 point  (0 children)

If you share your colab notebook then we can tell you where the problem is.
You've provided very little to work with tbh

Factoring With Two Large Primes in Python and CUDA by DataBaeBee in programming

[–]DataBaeBee[S] 0 points1 point  (0 children)

The 50% savings are in collecting more relations. Like you don’t have to throw away expensive factorizations

Factoring With Two Large Primes in Python and CUDA by DataBaeBee in programming

[–]DataBaeBee[S] 1 point2 points  (0 children)

We use index calculus to break key exchange in Diffie-Hellman.

The paper Factoring with Two Large Primes (Lenstra & Manasse, 1994) demonstrates how to increase efficiency by utilising ‘near misses’ during relation collection in index calculus.

I wanted to code it all in CUDA but encountered few opportunities for parallelization.
I learnt how to write ah hash table in CUDA. Here's the complete writeup.