Cryptography
64 Threads
(1/24) KZG Polynomial Commitments: The Complete Guide Our goal: 1) prove we are committed to a specific set of data and 2) allow others to verify specific points within that datas...
(1/10) KZG Commitment Scheme: Further Reading Want to dig deeper on elliptic curve cryptography, elliptic curve pairings and all of the other components of the Kate Polynomial Com...
(1/22) KZG Commitments Part 3: Verify After the prover has committed to the data, the verifier issued a challenge: "prove yourself based on this value." The prover has obliged, ge...
(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...
(1/24) Degen's Handbook: A Practical Guide to Elliptic Curve Pairings Magic is real, elliptic curve pairings are proof. Through incredibly advanced math, pairings allow us to mult...
(1/23) KZG Commitments Part 1: Commit Our goal: 1) prove we are committed to specific data and 2) allow others to verify specific points within that dataset. Before we get starte...
Here's a list of 43 cybersecurity YouTube channels: 1. Hak5 β General cybersecurity coverage. 2. The XSS Rat β Everything bounty hunting. 3. ITProTV β General cybersecurity covera...
(1/19) Elliptic Curve Cryptography: Trusted Setups Successful cryptography is cryptography that transforms legible data into digital-static. Before we go big, let's wrap our mind...
(1/25) Degen's Handbook: A Practical Guide to Elliptic Curve Cryptography Elliptic Curve Cryptography is TOUGH; sometimes you need to walk away from the details and reframe on the...
(1/17) Cryptography Basics: Polynomial Commitments Creating unique digital fingerprints is core to cryptography. We use tools like hashing to provide cryptographic-certainty witho...
(1/18) Cryptography Basics: Polynomial Encoding Humans think in words and ideas, machines think in numbers and math; the translation of words into numbers is core to basic computi...
(1/25) Cryptography Fundamentals: Elliptic Curve Cryptography Elliptic Curve Cryptography is (one of) our strongest cryptographic tools, vastly more secure than its predecessors....
(1/21) Cryptography Fundamentals: Diffie-Hellman Key Exchange How do you share private information over public networks? How can we create mathematically secure secrets? What actu...
Blockchain was first introduced in 2008 as part of a proposal for bitcoin. Today, it is more powerful than 500 supercomputers working together. Here is everything you need to kn...
(1/12) Cryptography 201: BLS Digital Signatures Digital signatures provide cryptographic assurance that a specific person sent a specific message. Their existence is critical, but...
Today, we are publishing several practically-exploitable cryptographic vulnerabilities in the Matrix (@matrixdotorg) standard and their flagship client Element, with Daniel Jones (...
(1/7) Cryptography 101: Digital Signatures The internet is the Wild West... how can we know who created a particular piece data? Can we be sure the data hasn't been altered? How c...
I made a huge advance on my decode. This is pretty cool because it actually gives me a date and a name π₯π₯ I'm still working on 7/23 posts. The End is the Beginning posts were from...
(1/13) Cryptography Basics: Zero-Knowledge Proofs To keep @ethereum decentralized & fair, we keep it slow enough for even the most humble nodes to keep up. But what if they didn't...
What is a Blockchain? Thread (with visuals). β https://t.co/V0uSsYak0Q
1/n: results: 59.7 % right on: ZK allow to prove statements without revealing secrets. While they may be used in verifiable compute, it's not what defines them. Verifiable compute...
Polygon ID is live π₯ Today, weβre announcing the launch of the first Polygon ID integration: @0xPolygonID x @0xPolygonDAO! Polygon ID is a self-sovereign identity solution powe...
Speaking of actual free speech issues, the EU is proposing a regulation that could mandate scanning of encrypted messages for CSAM material. This is Apple all over again. https://t...
Zero-knowledge proofs have a lot of applications beyond blockchains. π§΅π