Explore >> Select a destination


You are here

blog.trailofbits.com
| | blog.lambdaclass.com
4.5 parsecs away

Travel
| | Introduction Zero-knowledge proofs, also known as ZKPs, are becoming popular due to their numerous applications in delegating computations to untrusted servers and addressing scalability issues in decentralized ledgers. By using ZKPs, we can prove the validity of a given computation without revealing sensitive information, and the proof is short and
| | www.jeremykun.com
4.7 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | vitalik.eth.limo
3.4 parsecs away

Travel
| | [AI summary] The user is interested in understanding polynomial commitments and their applications in privacy-preserving computations, particularly in blockchain. They have provided a detailed overview of FRI, Kate, and bulletproofs, along with finite field arithmetic and encoding computations into polynomial equations. The user is looking for a concise summary of the key points, further clarification on the concepts, and guidance on how to proceed with learning more about the topic.
| | blog.0xbadc0de.be
21.3 parsecs away

Travel
|