Well done! You've reached the end of my post. Now you can leave a comment or read something else.
Here are some random popular articles:
- - Proof of Elgamal's semantic security using a reduction to DDH
- - Bits and Bytes ordering in 5 minutes
- - Common x509 certificate validation/creation pitfalls
- - Speed and Cryptography
- - How did length extension attacks made it into SHA-2?
- - Database Encryption
- - Schnorr's Signature and non-interactive Protocols
Here are some random recent articles:
- - Want to learn more about zkBitcoin? I've made some videos
- - The ZK update conflict issue in multi-user applications
- - The zero-knowledge attack of the year might just have happened, or how Nova got broken
- - Real-World Cryptography, a bit more than a year later
- - Are you into finding bugs and learning ZK? Here's a challenge for you
- - What's happening in the round 5 of PlonK?
- - Verifying zero-knowledge proofs on Bitcoin?
Comments
leave a comment...