Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceKnowledge Commitments With PolynomialsDo you remember polynomials at school? I hope so because the world of privacy and security is built on these algebraic structures. They are…Oct 2, 2023Oct 2, 2023

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceCryptography Fundamentals. Part 1: Groups, Rings and Discrete LogsThe problem with cryptography is that many miss some fundamental knowledge that will allow them to fully understand the key operations that…Jul 19, 20231Jul 19, 20231

Prof Bill Buchanan OBE FRSECryptography Fundamentals 3: Elliptic Curve FundamentalsApple podcast: [here]Jul 20, 2023Jul 20, 2023

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceYour Online Security Is Fundamentally Based on x⁸ + x⁴ + x³ + x² + 1Recently, I had two business students attending my applied cryptography lectures. Why? Because they were interested in blockchain and…Aug 17, 20231Aug 17, 20231

RubydusainCoinmonksProof of Life: Zero-Knowledge-Proof Implementation of Conway’s Game of Life with Circom and…Recently there is a rise in discussion about the potentials of ZKP — Zero Knowledge Proofs in crypto. Jumping on the bandwagon, I decided…Oct 12, 2022Oct 12, 2022

Tom WatsoninCoinmonksWhy is Polygon’s new zkEVM so amazing?Polygon’s ZK teams have made major performance breakthroughs, the holy grail of zero knowledge proofs…Jul 20, 20221Jul 20, 20221

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceExplaining BLS12–381 … The “Zero Knowledge Proof” CurveWhat’s “BLS”, “12” and “381” in BLS12–381?Jul 9, 2022Jul 9, 2022

Aw Kai ShinSigning and Verifying Ethereum MessagesOne exciting feature of Ethereum is the ability to prove consent directly between parties. In other words, you can easily validate that…Nov 9, 2022Nov 9, 2022

Aw Kai ShinSigning and Verifying Ethereum Hashed MessagesOne exciting feature of Ethereum is the ability to prove consent directly between parties. In other words, you can easily validate that…Oct 31, 2022Oct 31, 2022

Neeraj BagdiainHeru FinanceZero-knowledge proofs and Ethereum Layer-2 solutionsWhat are Zero-Knowledge proofs?Oct 20, 2022Oct 20, 2022

Ajith MZero-knowledge Proof explained!Data. Data is crucial in this modern society. For starters, As we already know the apps we use in everyday life collect data, store it, and…Oct 18, 20223Oct 18, 20223

Ashwin YardiMerkle trees explained — Part 1: What are merkle trees?If you are a dev / techie and if you have a high level understanding of blockchains, you surely have heard this buzzword: “Merkle trees”.Jul 26, 2022Jul 26, 2022

mbvissers.ethinBLOCK6Using Merkle Trees in SolidityCreating and verifying Merkle Tree proofs using Solidity smart contracts and JavaScript.Sep 19, 20221Sep 19, 20221

Trapdoor-TechZero Knowledge Proof — FPGA or GPU?Zero-Knowledge Proof now has a wider range of applications, such as privacy calculation, computational proving, consensus proving, and so…Sep 7, 2022Sep 7, 2022

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceBreaking and Unbreaking in Cybersecurity: RSA Solver for Two Different Public Key ExponentsAs a child, I was forever taking things apart and often did not put them back together again. For me, I had to discover the magic that made…Aug 27, 2022Aug 27, 2022

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceEd25519 is Great, But …“You can lead a horse to water, but you can’t make it drink”Jul 1, 2022Jul 1, 2022

Alexandr KumancevinCoinmonksNFT airdrop/whitelist implementation with MerkleTree.In this article, we’ll break down the MerkleTree proof implementation for your NFT collection’s airdrop/whitelist. (+testing). Using…Aug 9, 20223Aug 9, 20223

Ashwin YardiMerkle trees explained — Part 2: How verification of presence worksIn part 1 of this article, we tried to understand what merkle trees are and the concept behind. We know that merkle trees help us in…Jul 30, 2022Jul 30, 2022

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceExplaining The Chalkias Ed25519 VulnerabilityOne of the most important functions within a trusted infrastructure is the usage of a digital signature. In the past, ECDSA has been shown…Jul 2, 2022Jul 2, 2022