(1/24) KZG Polynomial Commitments: The Complete Guide Our goal: 1) prove we are committed to a specific set of data and 2) allow others to verify specific points within that datas...

(1/10) KZG Commitment Scheme: Further Reading Want to dig deeper on elliptic curve cryptography, elliptic curve pairings and all of the other components of the Kate Polynomial Com...

(1/22) KZG Commitments Part 3: Verify After the prover has committed to the data, the verifier issued a challenge: "prove yourself based on this value." The prover has obliged, ge...

(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...

(1/24) Degen's Handbook: A Practical Guide to Elliptic Curve Pairings Magic is real, elliptic curve pairings are proof. Through incredibly advanced math, pairings allow us to mult...

(1/23) KZG Commitments Part 1: Commit Our goal: 1) prove we are committed to specific data and 2) allow others to verify specific points within that dataset. Before we get starte...

Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β€” General cybersecurity coverage. 2. The XSS Rat β€” Everything bounty hunting. 3. ITProTV β€” General cybersecurity covera...

(1/19) Elliptic Curve Cryptography: Trusted Setups Successful cryptography is cryptography that transforms legible data into digital-static. Before we go big, let's wrap our mind...

(1/25) Degen's Handbook: A Practical Guide to Elliptic Curve Cryptography Elliptic Curve Cryptography is TOUGH; sometimes you need to walk away from the details and reframe on the...

(1/17) Cryptography Basics: Polynomial Commitments Creating unique digital fingerprints is core to cryptography. We use tools like hashing to provide cryptographic-certainty witho...

(1/18) Cryptography Basics: Polynomial Encoding Humans think in words and ideas, machines think in numbers and math; the translation of words into numbers is core to basic computi...

(1/25) Cryptography Fundamentals: Elliptic Curve Cryptography Elliptic Curve Cryptography is (one of) our strongest cryptographic tools, vastly more secure than its predecessors....

(1/21) Cryptography Fundamentals: Diffie-Hellman Key Exchange How do you share private information over public networks? How can we create mathematically secure secrets? What actu...

Blockchain was first introduced in 2008 as part of a proposal for bitcoin. Today, it is more powerful than 500 supercomputers working together. Here is everything you need to kn...

(1/12) Cryptography 201: BLS Digital Signatures Digital signatures provide cryptographic assurance that a specific person sent a specific message. Their existence is critical, but...

Today, we are publishing several practically-exploitable cryptographic vulnerabilities in the Matrix (@matrixdotorg) standard and their flagship client Element, with Daniel Jones (...

(1/7) Cryptography 101: Digital Signatures The internet is the Wild West... how can we know who created a particular piece data? Can we be sure the data hasn't been altered? How c...

I made a huge advance on my decode. This is pretty cool because it actually gives me a date and a name πŸ”₯πŸ”₯ I'm still working on 7/23 posts. The End is the Beginning posts were from...

(1/13) Cryptography Basics: Zero-Knowledge Proofs To keep @ethereum decentralized & fair, we keep it slow enough for even the most humble nodes to keep up. But what if they didn't...

What is a Blockchain? Thread (with visuals). ↓ https://t.co/V0uSsYak0Q

1/n: results: 59.7 % right on: ZK allow to prove statements without revealing secrets. While they may be used in verifiable compute, it's not what defines them. Verifiable compute...

Polygon ID is live πŸ”₯ Today, we’re announcing the launch of the first Polygon ID integration: @0xPolygonID x @0xPolygonDAO! Polygon ID is a self-sovereign identity solution powe...

Speaking of actual free speech issues, the EU is proposing a regulation that could mandate scanning of encrypted messages for CSAM material. This is Apple all over again. https://t...

Zero-knowledge proofs have a lot of applications beyond blockchains. πŸ§΅πŸ‘‡