Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
Time-Locked Cryptography | Better HN
Time-Locked Cryptography
(opens in new tab)
(farlow.dev)
4 points
lispybanana
29d ago
1 comments
Share
1 comments
default
newest
oldest
yepchaos
28d ago
Interesting post. Normally, modular exponentiation is O(log e) via binary exponentiation. By setting the exponent to 2^t, u can force the operation to be sequential.
j
/
k
navigate · click thread line to collapse