security public key cryptography cryptography cryptanalysis rsa number theory mathematics hacking algebra software architecture group theory exploitation diffie-hellman flight software quality software engineering model based testing reverse engineering demo extended euclidean algorithm secure programming factoring algorithms design computer science public key software testing modular arithmetic testing ethical hacking experiments traceability random number chosen ciphertext attack python testability security assurance software test case generation model-based testing design for security software analysis no padding shared rsa modulus key exchange mbt cyber security linux requirements test case generation secure coding automated test case generation integer security threat modeling integer smt solvers security research information security owasp symmetric encryption c and c++ web server client-server architecture metrics patching unix penetration testing information technology vulnerability research http load-time hacking architecture medical device code quality industrial systems ground software software quality architecture maintenance and evolution software testability software product line software architecture style nasa software runtime analysis static analysis dynamic analysis api safety security bugs threats publish-subscribe design-for-security migitation hackers vulnerabilities remote code execution stack canary remote buffer overflow operating system security address space randomization side-channel attacks patterns programming software bus square root cyclic group quantum wiener short secret exponent continued fractions binary search bigdecimal biginteger parity games homomorphism chosen plaintext attack textbook rsa raw rsa meet-in-the-middle attack java rsa numbers integer factorization deserialization .net program understanding relational algebra random trapdoor cyclic attack e public exponent hastad chinese-remainder theorem authentication password srp active attack applied algebra math file i/o privilege escalation discrete log algorithm baby-step gaint-step dependencies code architecture case study documentation code view code analysis modular view design for testing system of systems architectural views architectural style program analysis computer arithmetic denial of service verification counterexample theorem provers reliability automation links test cases source code documents searching vector space secure communication prime number industry fermat euler euclid common factor attack pki key derivation intractable discrete math model
See more