Módulo 7 - Techonology
Pseudo-random / random
https://docs.python.org/3/library/random.html
https://www.2uo.de/myths-about-urandom/
Diffie-hellman
http://numaboa.com.br/criptografia/chaves/353-diffie-hellman
Pycrypto
http://docs.python-guide.org/en/latest/scenarios/crypto/
https://www.laurentluce.com/posts/python-and-cryptography-with-pycrypto/
http://pycryptodome.readthedocs.io/en/latest/src/examples.html
Public key
https://medium.com/@vrypan/explaining-public-key-cryptography-to-non-geeks-f0994b3c2d5
Hash functions
https://www.lifewire.com/cryptographic-hash-function-2625832
https://tools.kali.org/password-attacks/hashcat
Criptografia simétrica
https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
Curvas elípticas
https://link.springer.com/chapter/10.1007/3-540-39799-X_31
O efeito da supremacia quântica no futuro da criptografia
https://medium.com/@brunoartc/o-efeito-da-supremacia-quântica-no-futuro-da-criptografia-cd00dc049d5b