
What is modular arithmetic? (article) | Khan Academy
A modular circle of size -3 wouldn't make much sense. However, if we wanted to find out the remainder of A/B when B is negative, we can simply multiply A/B by -1/-1 to make B positive.
Modular exponentiation (article) | Khan Academy
Use fast modular exponentiation as described in the next lesson. Right after that lesson there is a calculator for modular exponents, so you can check your calculations.
Congruence modulo (article) | Cryptography | Khan Academy
Can anyone help me? I understand modulo arithmetic but I cannot understand congruence modulo and how to solve this. It is really frustrating.
Modular inverses (article) | Cryptography | Khan Academy
So as you can see, we are not dividing, but instead using modular inverses. The end result looks like we are dividing and intuitively what we are doing is similar, but is important to note that we …
Modular addition and subtraction (article) | Khan Academy
Let's explore the addition property of modular arithmetic: (A + B) mod C = (A mod C + B mod C) mod C Example: Let A=14, B=17, C=5
Arithmetic - Khan Academy
This Arithmetic course is a refresher of place value and operations (addition, subtraction, division, multiplication, and exponents) for whole numbers, fractions, decimals, and integers.
Algebra 2 | Math | Khan Academy
Unit 1 Polynomial arithmetic Unit 2 Complex numbers Unit 3 Polynomial factorization Unit 4 Polynomial division
Fast modular exponentiation (article) | Khan Academy
This has given us a method to calculate A^B mod C quickly provided that B is a power of 2. However, we also need a method for fast modular exponentiation when B is not a power of 2.
Bringing the set operations together (video) | Khan Academy
Do the set operations have an order of precedence in the same way the operations of arithmetic do. In this example it's not clear to me if you do the union with (B intersect C) before or after …
Modular multiplication (article) | Khan Academy
Most modern cryptography relies on modular arithmetic. Two notable example are RSA and Diffie Hellman. Older ciphers like the Caesar cipher, Vigenere cipher, and Affine ciphers use it too.