Francesco

What is a Blockchain? A thread:

Mike Driscoll

You can use Pycryptodome to encrypt a file and decrypt it. In this example, you use RSA encryption to encrypt a file with #Python https://t.co/GPXMKbTIJ9

navin346.eth 🫑

#Hashfunctions : Tried to wrap my head around the complexity behind numbers on identifying collision hashes. πŸ‘‡πŸ‘‡ 1/10

Architecture Notes

With the breach of LastPass and everyone wondering if their vaults will be impervious to attacks. I thought it might be good time to refresh our understanding on two type of encryp...

Abhishek Meena

Cryptography For Beginner Part - 1 #bugbounty #Infosec Thread 🧡:πŸ‘‡

Shiva πŸ¦‡πŸ”Š

Zero-Knowledge Proofs STARKs vs SNARKs A ground-up guide🧡 https://t.co/o7hzapoTdI

Shiva πŸ¦‡πŸ”Š

(1/19) zkSNARKs are a groundbreaking technology But they have a newer, shinier cousin: zkSTARKs A normie's guide to this fascinating technology🧡 https://t.co/CFWVuditul

Daniel Kelley

Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β€” General cybersecurity coverage. 2. The XSS Rat β€” Everything bounty hunting. 3. ITProTV β€” General cybersecurity covera...

Arya's List 🍊🌞

I think he's gone because we no longer need him πŸ˜‰ don't get upset about his absence, it's actually a good sign ❀️ https://t.co/rartIV2sSp

Logarithmic Rex

(1/25) Cryptographic Innovation: Verkle Trees @ethereum is the World Computer; born a rudimentary number cruncher, on a journey to (inevitably) becoming the dominant global settle...

Logarithmic Rex

(1/20) Cryptography Basics: Commitment Schemes A commitment scheme is a primitive that allows one party to generate a piece of data anchored to a specific dataset. This anchor (c...

TheSequence

Do you know what the birthday paradox means? And how is it related to cryptography? Let us tell you! ThreadπŸ§΅πŸ‘‡ https://t.co/TvDjcEr0sa

Logarithmic Rex

(1/19) Cryptography Basics: Polynomial Erasure Codes Moving data across the internet is difficult; assuming you trust all the intermediate parties, you still have vicious network...

Logarithmic Rex

(1/24) KZG Polynomial Commitments: The Complete Guide Our goal: 1) prove we are committed to a specific set of data and 2) allow others to verify specific points within that datas...

Logarithmic Rex

(1/10) KZG Commitment Scheme: Further Reading Want to dig deeper on elliptic curve cryptography, elliptic curve pairings and all of the other components of the Kate Polynomial Com...

Logarithmic Rex

(1/22) KZG Commitments Part 3: Verify After the prover has committed to the data, the verifier issued a challenge: "prove yourself based on this value." The prover has obliged, ge...

Logarithmic Rex

(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...

Logarithmic Rex

(1/24) Degen's Handbook: A Practical Guide to Elliptic Curve Pairings Magic is real, elliptic curve pairings are proof. Through incredibly advanced math, pairings allow us to mult...

Logarithmic Rex

(1/23) KZG Commitments Part 1: Commit Our goal: 1) prove we are committed to specific data and 2) allow others to verify specific points within that dataset. Before we get starte...

Daniel Kelley

Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β€” General cybersecurity coverage. 2. The XSS Rat β€” Everything bounty hunting. 3. ITProTV β€” General cybersecurity covera...

Logarithmic Rex

(1/19) Elliptic Curve Cryptography: Trusted Setups Successful cryptography is cryptography that transforms legible data into digital-static. Before we go big, let's wrap our mind...

Logarithmic Rex

(1/25) Degen's Handbook: A Practical Guide to Elliptic Curve Cryptography Elliptic Curve Cryptography is TOUGH; sometimes you need to walk away from the details and reframe on the...

Logarithmic Rex

(1/17) Cryptography Basics: Polynomial Commitments Creating unique digital fingerprints is core to cryptography. We use tools like hashing to provide cryptographic-certainty witho...

Logarithmic Rex

(1/18) Cryptography Basics: Polynomial Encoding Humans think in words and ideas, machines think in numbers and math; the translation of words into numbers is core to basic computi...