You are here |
rot256.dev | ||
| | | |
blog.lambdaclass.com
|
|
| | | | Introduction An interactive proof is a protocol between two parties, a prover $\mathcal{P}$ and a verifier $\mathcal{V}$, where the prover attempts to convince the verifier of the validity of a statement. By leveraging randomness and interaction, the verifier can check the statement more efficiently than by doing everything | |
| | | |
neilmadden.blog
|
|
| | | | Wikipedia's definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient. -Wikipedia They also have a handy diagram of the process... | |
| | | |
blog.cryptographyengineering.com
|
|
| | | | This is the third and penultimate post in a series about theoretical weaknesses in Fiat-Shamir as applied to proof systems. The first post is here, the second post is here, and you should probably read them. Over the past two posts I've given a bit of background on four subjects: (1) interactive proof systems (for... | |
| | | |
cyberwarhead.com
|
|
| | I've been working on a thing that looks and acts like a hash but it isn't designed to uniquely identify a set of bytes. It's designed to represent a group of similar files, like a bucket it can contain many drops of water. The problem I hope to address is as follows: Changing some bits... |