security public key cryptography cryptography rsa cryptanalysis number theory mathematics algebra hacking software architecture group theory demo diffie-hellman software engineering exploitation reverse engineering flight software quality model based testing extended euclidean algorithm factoring algorithms computer science public key modular arithmetic secure programming design software testing shared rsa modulus cyber security no padding traceability random number python key exchange experiments software analysis security assurance testing ethical hacking design for security secure coding requirements chosen ciphertext attack mbt test case generation linux model-based testing software test case generation testability automated test case generation deserialization .net program understanding relational algebra random trapdoor cyclic attack e public exponent hastad chinese-remainder theorem authentication password srp active attack applied algebra math file i/o privilege escalation square root cyclic group quantum wiener short secret exponent continued fractions binary search bigdecimal biginteger parity games homomorphism chosen plaintext attack textbook rsa raw rsa meet-in-the-middle attack java rsa numbers integer factorization reliability automation links test cases source code documents searching vector space secure communication prime number industry fermat euler euclid common factor attack pki key derivation intractable discrete math discrete log algorithm baby-step gaint-step dependencies code architecture case study documentation code view code analysis modular view design for testing system of systems architectural views architectural style program analysis computer arithmetic denial of service verification counterexample theorem provers smt solvers integer integer security symmetric encryption web server client-server architecture metrics patching penetration testing vulnerability research http information technology unix c and c++ owasp information security security research threat modeling security bugs threats publish-subscribe design-for-security migitation hackers vulnerabilities remote code execution stack canary remote buffer overflow operating system security address space randomization side-channel attacks patterns programming software bus model load-time hacking architecture medical device code quality industrial systems ground software software quality architecture maintenance and evolution software testability software product line software architecture style nasa software runtime analysis static analysis dynamic analysis api safety
See more