0xHusenThe end game of MSM-batch affine in elliptic curve point additionSince my idea about hardware implementation of batch affine in elliptic curve point addition, which originally came from Aztec barretenberg…Nov 22
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 3—Elliptic Curve CryptographyWe continue our journey to explore how zero-knowledge proofs work. After a broad overview of zero-knowledge proofs and how they enable…Jul 14
RocketMe Up CybersecurityExploring Elliptic Curve vs. Lattice-Based Cryptography for Future SecurityExploring the strengths, challenges, and future of elliptic curve and lattice-based cryptography for digital security.Nov 13Nov 13
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 2 — Math Basics for CryptographyWe started this series with a previous article giving a broad-overview of zero-knowledge proofs and their role in enabling verifiable…Jul 14Jul 14
DivyasshreeThe End of EOAs? How RIP-7212 Changes EverythingIn this blog, we’ll explore what this proposal is about, what problem it solves, why it matters, and its current status, among other…Nov 8Nov 8
0xHusenThe end game of MSM-batch affine in elliptic curve point additionSince my idea about hardware implementation of batch affine in elliptic curve point addition, which originally came from Aztec barretenberg…Nov 22
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 3—Elliptic Curve CryptographyWe continue our journey to explore how zero-knowledge proofs work. After a broad overview of zero-knowledge proofs and how they enable…Jul 14
RocketMe Up CybersecurityExploring Elliptic Curve vs. Lattice-Based Cryptography for Future SecurityExploring the strengths, challenges, and future of elliptic curve and lattice-based cryptography for digital security.Nov 13
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 2 — Math Basics for CryptographyWe started this series with a previous article giving a broad-overview of zero-knowledge proofs and their role in enabling verifiable…Jul 14
DivyasshreeThe End of EOAs? How RIP-7212 Changes EverythingIn this blog, we’ll explore what this proposal is about, what problem it solves, why it matters, and its current status, among other…Nov 8
Tech Talk With AlexCryptography in Python — A practical example to codeCryptography can be a bit intimidating at first, but once you have it down, you can use cryptography in Python to help keep your data…Jan 8, 2023
Guilherme Balena VersianiCrypto Pills #7: Building Verifiable Secret Sharing with Elliptic Curves in GoAs see in Crypto Pills #6, Verifiable Secret Sharing is a cryptographic technique that allows a secret to be divided into multiple parts…Nov 5
Michael AvoyanMastering JWT with Nimbus JOSE libraryIn this article, we dive deep into the world of JSON Web Tokens (JWT) and how the Nimbus JOSE + JWT library (com.nimbusds:nimbus-jose-jwt)…Dec 1, 2023