math

  • 19th January 2026

From Keys to Protocols: ECDH and ECDSA (Part 2/2)

How elliptic curve math enables secure key exchange and digital signatures

Read more 
  • 16th January 2026

The Math Behind Your Private Key (Part 1/2)

From group theory to elliptic curves: how public-key cryptography actually works

Read more 
  • 11th January 2026

The Limits of Computation (Part 3/3)

What Turing machines can't do, and why it matters

Read more 
  • 10th January 2026

What It Means to Be Turing Complete (Part 2/3)

Why brains and AI are 'approximate Turing machines'

Read more 
  • 9th January 2026

What is a Turing Machine? (Part 1/3)

The elegant abstraction that defines what it means to compute

Read more 
  • 8th January 2026

Three Proofs by Diagonalization

A family of proofs that construct objects guaranteed to differ from every item in a list

Read more 
  • 6th January 2026

Russell's Paradox

A fundamental contradiction that shook the foundations of mathematics

Read more