|
You are here |
blog.lambdaclass.com | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | ||
| | | | |
vitalik.eth.limo
|
|
| | | | | [AI summary] The user is interested in understanding polynomial commitments and their applications in privacy-preserving computations, particularly in blockchain. They have provided a detailed overview of FRI, Kate, and bulletproofs, along with finite field arithmetic and encoding computations into polynomial equations. The user is looking for a concise summary of the key points, further clarification on the concepts, and guidance on how to proceed with learning more about the topic. | |
| | | | |
andrea.corbellini.name
|
|
| | | | | [AI summary] The text provides an in-depth explanation of elliptic curve cryptography (ECC), covering fundamental concepts such as elliptic curves over finite fields, point addition, cyclic subgroups, subgroup orders, and the discrete logarithm problem. It also discusses practical aspects like finding base points, cofactors, and the importance of choosing subgroups with high order for cryptographic security. The text emphasizes that ECC relies on the difficulty of solving the discrete logarithm problem on elliptic curves, which is considered computationally hard and forms the basis for secure cryptographic protocols like ECDH and ECDSA. | |
| | | | |
paragonie.com
|
|
| | | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP | ||