|
You are here |
blog.lambdaclass.com | ||
| | | | |
www.jeremykun.com
|
|
| | | | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | |
| | | | |
www.openzeppelin.com
|
|
| | | | | OpenZeppelin has assembled a team of ZKP experts, delivering security audits to top-tier projects including ZK-Sync, Scorll, and Linea over the past 2 years. Based on these valuable collaborations, OpenZeppelin is now officially launching the ZKP practice with a range of top-tier services aimed at innovative projects building and operating the top ZKP systems in the world. | |
| | | | |
blog.nuculabs.de
|
|
| | | | | This is my first book review that I did my blog, I'm not really good at reviewing books and I'm not a native english speaker either, so bear with me and my clumsy english. I must also say that the subject covered by the book overwhelms me, I don't claim to be an expert on the topic and and to be honest I don't really want to become one, reading this book has provided me with enough information in order to be able to hold a basic discussion about cryptography related topics, had I put more effort, time and thought in this book I could probably become proficient. | |
| | | | |
marcospereira.me
|
|
| | | In this post we summarize the math behind deep learning and implement a simple network that achieves 85% accuracy classifying digits from the MNIST dataset. | ||