Teleonomic cyborg semiotics

O.C.E.A.N., H.E.X.A.C.O. and autopoietic heterarchical hypermedia systems

[0]: “1. B generates a public key χ by resorting to a certain set of ‘generators’.
2. B sends the public key to A. Anyone can see it.
3. A uses the key to encrypt the message M;
4. A sends the encrypted message Mχ to B, but none can decrypt it.
5. B receives the message Mχ and, knowing the generators, is able to decrypt it.” (https://www.researchgate.net/publication/47374725_Post_Quantum_Cryptography_from_Mutant_Prime_Knots)
[1]: “The generation of these more complex topologies may also be of interest in other applications relying on framed knots, such as quantum money.” https://www.nature.com/articles/s41467-020-18792-z
[2]: https://arxiv.org/abs/1702.03974

nobody leaves the cave before the end of a new dawn https://gist.github.com/dualyticalchemy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store