Interactive slide decks covering cryptographic systems end-to-end — from the underlying mathematics through NIST standards to SystemVerilog RTL and Python implementations. Click any presentation below to launch it.
GF(p) & GF(2ⁿ) · AES · ECC primes · Montgomery multiplication · SystemVerilog · Python
Curve geometry · Point addition · ECDH · ECDSA · Curve25519 · Edwards curves · Hardware
Rijndael · S-box · MixColumns · Key schedule · Hardware architectures · Side-channel countermeasures
SHA-2 · SHA-3 · HMAC · Merkle-Damgård · Sponge construction · Password hashing · Merkle trees
RSA · Diffie-Hellman · Key exchange · Number theory · ElGamal · PKI · Hybrid encryption
Signature schemes · Ed25519 · Schnorr · MuSig2 · FROST · Threshold signatures
Lattices · ML-KEM · ML-DSA · SPHINCS+ · NTT · NIST PQC standards
RLWE · BGV · BFV · CKKS · TFHE · Bootstrapping · Hardware accelerators · Private ML
Timing · Power analysis · EM · Cache attacks · Fault injection · Masking · TVLA
AES-NI · ECC co-processors · PQC NTT · FPGA crypto cores · SoC integration · FIPS 140-3
Sigma protocols · Fiat-Shamir · ZK-SNARKs · ZK-STARKs · PLONK · Bulletproofs · Recursive composition
Secret sharing · Garbled circuits · Oblivious transfer · SPDZ · GMW · PSI · Privacy-preserving ML
1-RTT handshake · ECDHE · Key schedule · HKDF · 0-RTT · Certificate handling · Post-quantum TLS