[about] :: [index] :: [github]

# Evaluating Limits With Euler’s Number

In calculus, there are many ways to evaluate(i.e., finding the actual value) a limit. There is not a preferred method over another, you have to learn all of them and choose the right one according to the limit you are trying to solve. In this guide, we will see how to solve limits using Euler’s number($e$). Before going further, I will assume that you already know the formal definition of a limit, how to solve them(at least the simpler one) and the basics of algebra.

# Asymmetrical Cryptography - An Overview of DH, RSA and ECC

Introduction To Public Key Cryptography Public key cryptography(also known as asymmetrical cryptography) is a type of cryptography that relies on a pair of cryptographic keys(i.e., private key and public key); this kind of cryptography is the opposed of the symmetrical cryptography where each actor must know the cryptography key before receiving or sending a message. Why It Is So Important? Asymmetrical cryptography is probably the most important kind of cryptography - at least in computer science - since it allows two parts who have never met each other before to safely exchange information over an insecure communication channel.