Elliptic curve group law, discrete log behind ECDH, and the Frey-Ribet-Wiles argument that proved Fermat's Last Theorem, walked through with diagrams of y² = x³ + ax + b, point addition cases, and the modularity logic chain.
Four infrastructure-security stories from early March 2026: AI attack tool CyberStrikeAI compromising 600 FortiGates, Cloudflare's split detection/blocking WAF architecture, standardization of TLS Encrypted Client Hello, and CISA's KEV addition for VMware Aria Operations.