Charlie and Amita crunch away on their laptops, as Larry
studies decryption equations on the board.
CHARLIE
Our hacker knows what he's doing.
AMITA
128-bit encryption key... he's
definitely not making our lives easy.
LARRY
Perhaps we could leverage the
discrete logarithm problem with
elliptic curve cryptography.
CHARLIE
That's next if this doesn't work.
On an elliptic curve, if a line through two rational points P and Q intersects the curve again at
R, then R is another rational point. This property is fundamental in number theory.
BEGIN AUDIENCE VISION
A CAD room, filled with virtual furniture, lamps, etc...
CHARLIE (cont'd)
It allows designers to see what a
space will look like from different
angles, using different floorplans.
The POV and the objects in the room now move around (and move
around Charlie) -- light, shadow and perspective changing...
CHARLIE (cont'd)
As the observer and the objects move
around, the CAD algorithm calculates
light, shadow, perspective...
An unknown 3D shape depends on its polygonal base. You can see its shadow on the floor and on the walls. Can you imagine what the shape is?
CHARLIE (ON VIDEO)
Clearly he's keeping us off-balance.
The diversion tactics... shifting
deadlines... threats. Classic game
theory. Perfect for a Structured No-
Regret Minimization Analysis...
LEN WALSH
I think I missed that day in school.
CHARLIE (ON VIDEO)
You play poker?
This Demonstration generates random poker hands. Each of the 2598960 different possible poker hands will get one of the ten possible rankings, from royal flush to nothing.