this post was submitted on 18 Nov 2024
11 points (92.3% liked)

Cybersecurity

5697 readers
244 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] BorisBoreUs@lemmy.world 8 points 23 hours ago

This is above my 'not keen on cryptographic maths' head. Can someone dumb this down and explain its usefulness in plain terms? I attempted to read the overview but it was also like Sanskrit to me. Is this a big change for public key encryption or maybe a more efficient way of processing the math, or just an alternate method someone has found?