barchitect.web3Advanced cryptography primitives — group, finite field, elliptic curve and pairing.While conducting research on advanced cryptographic protocols, you may notice that many fundamental elements are repeated over and over…4d ago
Michael AvoyanMastering JWT with Nimbus JOSE libraryIn this article, we dive deep into the world of JSON Web Tokens (JWT) and how the Nimbus JOSE + JWT library (com.nimbusds:nimbus-jose-jwt)…Dec 1, 2023
Solidity AcademyBlockchain Mathematics: The Hidden Power Behind Blockchain TechnologyThe Mathematical Backbone Powering Decentralized TechnologyOct 3Oct 3
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 2 — Math Basics for CryptographyWe started this series with a previous article giving a broad-overview of zero-knowledge proofs and their role in enabling verifiable…Jul 14Jul 14
barchitect.web3Advanced cryptography primitives — group, finite field, elliptic curve and pairing.While conducting research on advanced cryptographic protocols, you may notice that many fundamental elements are repeated over and over…4d ago
Michael AvoyanMastering JWT with Nimbus JOSE libraryIn this article, we dive deep into the world of JSON Web Tokens (JWT) and how the Nimbus JOSE + JWT library (com.nimbusds:nimbus-jose-jwt)…Dec 1, 2023
Solidity AcademyBlockchain Mathematics: The Hidden Power Behind Blockchain TechnologyThe Mathematical Backbone Powering Decentralized TechnologyOct 3
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 2 — Math Basics for CryptographyWe started this series with a previous article giving a broad-overview of zero-knowledge proofs and their role in enabling verifiable…Jul 14
Frank MangoneCryptography 101: Elliptic Curves (Somewhat) DemystifiedAn introductory dive into the world of elliptic curves, forming the basis for understanding useful cryptographic mechanisms.Mar 111
Aardvark InfinityinAardvark Infinity🔒 Elliptic Curves: The Mathematical Backbone of Secure Military CommunicationsElliptic curves play a pivotal role in modern cryptography, particularly in securing military communications. Elliptic curve cryptography…Sep 10
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 3—Elliptic Curve CryptographyWe continue our journey to explore how zero-knowledge proofs work. After a broad overview of zero-knowledge proofs and how they enable…Jul 14