Implemenation of same basic algorithms used in cryptography.
ROCA: Infineon RSA key vulnerability
Discrete logarithms in the ring of integers modulo n