Cryptography
51 Threads
What is a Blockchain? A thread:
You can use Pycryptodome to encrypt a file and decrypt it. In this example, you use RSA encryption to encrypt a file with #Python https://t.co/GPXMKbTIJ9
#Hashfunctions : Tried to wrap my head around the complexity behind numbers on identifying collision hashes. ππ 1/10
With the breach of LastPass and everyone wondering if their vaults will be impervious to attacks. I thought it might be good time to refresh our understanding on two type of encryp...
Cryptography For Beginner Part - 1 #bugbounty #Infosec Thread π§΅:π
Zero-Knowledge Proofs STARKs vs SNARKs A ground-up guideπ§΅ https://t.co/o7hzapoTdI
(1/19) zkSNARKs are a groundbreaking technology But they have a newer, shinier cousin: zkSTARKs A normie's guide to this fascinating technologyπ§΅ https://t.co/CFWVuditul
Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β General cybersecurity coverage. 2. The XSS Rat β Everything bounty hunting. 3. ITProTV β General cybersecurity covera...
I think he's gone because we no longer need him π don't get upset about his absence, it's actually a good sign β€οΈ https://t.co/rartIV2sSp
(1/25) Cryptographic Innovation: Verkle Trees @ethereum is the World Computer; born a rudimentary number cruncher, on a journey to (inevitably) becoming the dominant global settle...
(1/20) Cryptography Basics: Commitment Schemes A commitment scheme is a primitive that allows one party to generate a piece of data anchored to a specific dataset. This anchor (c...
Do you know what the birthday paradox means? And how is it related to cryptography? Let us tell you! Threadπ§΅π https://t.co/TvDjcEr0sa
(1/19) Cryptography Basics: Polynomial Erasure Codes Moving data across the internet is difficult; assuming you trust all the intermediate parties, you still have vicious network...
(1/24) KZG Polynomial Commitments: The Complete Guide Our goal: 1) prove we are committed to a specific set of data and 2) allow others to verify specific points within that datas...
(1/10) KZG Commitment Scheme: Further Reading Want to dig deeper on elliptic curve cryptography, elliptic curve pairings and all of the other components of the Kate Polynomial Com...
(1/22) KZG Commitments Part 3: Verify After the prover has committed to the data, the verifier issued a challenge: "prove yourself based on this value." The prover has obliged, ge...
(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...
(1/24) Degen's Handbook: A Practical Guide to Elliptic Curve Pairings Magic is real, elliptic curve pairings are proof. Through incredibly advanced math, pairings allow us to mult...
(1/23) KZG Commitments Part 1: Commit Our goal: 1) prove we are committed to specific data and 2) allow others to verify specific points within that dataset. Before we get starte...
Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β General cybersecurity coverage. 2. The XSS Rat β Everything bounty hunting. 3. ITProTV β General cybersecurity covera...
(1/19) Elliptic Curve Cryptography: Trusted Setups Successful cryptography is cryptography that transforms legible data into digital-static. Before we go big, let's wrap our mind...
(1/25) Degen's Handbook: A Practical Guide to Elliptic Curve Cryptography Elliptic Curve Cryptography is TOUGH; sometimes you need to walk away from the details and reframe on the...
(1/17) Cryptography Basics: Polynomial Commitments Creating unique digital fingerprints is core to cryptography. We use tools like hashing to provide cryptographic-certainty witho...
(1/18) Cryptography Basics: Polynomial Encoding Humans think in words and ideas, machines think in numbers and math; the translation of words into numbers is core to basic computi...