InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEKnowledge Commitments With PolynomialsDo you remember polynomials at school? I hope so because the world of privacy and security is built on these algebraic structures. They are…Oct 2, 2023Oct 2, 2023
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSECryptography Fundamentals. Part 1: Groups, Rings and Discrete LogsThe problem with cryptography is that many miss some fundamental knowledge that will allow them to fully understand the key operations that…Jul 19, 20231Jul 19, 20231
Prof Bill Buchanan OBE FRSECryptography Fundamentals 3: Elliptic Curve FundamentalsApple podcast: [here]Jul 20, 2023Jul 20, 2023
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEYour Online Security Is Fundamentally Based on x⁸ + x⁴ + x³ + x² + 1Recently, I had two business students attending my applied cryptography lectures. Why? Because they were interested in blockchain and…Aug 17, 20231Aug 17, 20231
InCoinmonksbyRubydusaProof of Life: Zero-Knowledge-Proof Implementation of Conway’s Game of Life with Circom and…Recently there is a rise in discussion about the potentials of ZKP — Zero Knowledge Proofs in crypto. Jumping on the bandwagon, I decided…Oct 12, 2022Oct 12, 2022
InCoinmonksbyTom WatsonWhy is Polygon’s new zkEVM so amazing?Polygon’s ZK teams have made major performance breakthroughs, the holy grail of zero knowledge proofs…Jul 20, 20221Jul 20, 20221
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEExplaining BLS12–381 … The “Zero Knowledge Proof” CurveWhat’s “BLS”, “12” and “381” in BLS12–381?Jul 9, 2022Jul 9, 2022
Aw Kai ShinSigning and Verifying Ethereum MessagesOne exciting feature of Ethereum is the ability to prove consent directly between parties. In other words, you can easily validate that…Nov 9, 2022Nov 9, 2022
Aw Kai ShinSigning and Verifying Ethereum Hashed MessagesOne exciting feature of Ethereum is the ability to prove consent directly between parties. In other words, you can easily validate that…Oct 31, 2022Oct 31, 2022
InHeru FinancebyNeeraj BagdiaZero-knowledge proofs and Ethereum Layer-2 solutionsWhat are Zero-Knowledge proofs?Oct 20, 2022Oct 20, 2022
Ajith MZero-knowledge Proof explained!Data. Data is crucial in this modern society. For starters, As we already know the apps we use in everyday life collect data, store it, and…Oct 18, 20223Oct 18, 20223
Ashwin YardiMerkle trees explained — Part 1: What are merkle trees?If you are a dev / techie and if you have a high level understanding of blockchains, you surely have heard this buzzword: “Merkle trees”.Jul 26, 2022Jul 26, 2022
InBLOCK6bymbvissers.ethUsing Merkle Trees in SolidityCreating and verifying Merkle Tree proofs using Solidity smart contracts and JavaScript.Sep 19, 20221Sep 19, 20221
Trapdoor-TechZero Knowledge Proof — FPGA or GPU?Zero-Knowledge Proof now has a wider range of applications, such as privacy calculation, computational proving, consensus proving, and so…Sep 7, 2022Sep 7, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEBreaking and Unbreaking in Cybersecurity: RSA Solver for Two Different Public Key ExponentsAs a child, I was forever taking things apart and often did not put them back together again. For me, I had to discover the magic that made…Aug 27, 2022Aug 27, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEEd25519 is Great, But …“You can lead a horse to water, but you can’t make it drink”Jul 1, 2022Jul 1, 2022
InCoinmonksbyAlexandr KumancevNFT airdrop/whitelist implementation with MerkleTree.In this article, we’ll break down the MerkleTree proof implementation for your NFT collection’s airdrop/whitelist. (+testing). Using…Aug 9, 20223Aug 9, 20223
Ashwin YardiMerkle trees explained — Part 2: How verification of presence worksIn part 1 of this article, we tried to understand what merkle trees are and the concept behind. We know that merkle trees help us in…Jul 30, 2022Jul 30, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEExplaining The Chalkias Ed25519 VulnerabilityOne of the most important functions within a trusted infrastructure is the usage of a digital signature. In the past, ECDSA has been shown…Jul 2, 2022Jul 2, 2022