Explore >> Select a destination


You are here

blog.lambdaclass.com
| | blog.cryptohack.org
1.4 parsecs away

Travel
| | Last weekend TetCTF held their new year CTF competition. I felt particularly nostalgic playing this, as it was the TetCTF 2020 CTF where Hyper and I played the crypto challenges and soon after decided to make CryptoHack together. Something about Ndh's crypto challenges really make me want to keep learning.
| | www.johndcook.com
2.5 parsecs away

Travel
| | The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview.
| | kndrck.co
1.4 parsecs away

Travel
| | Motivation RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and is different from the decryption key which is kept secret. If I wanted to comprehend zero knowledge proofs, then understanding the grand-daddy of public-key cryptosystems is a must. Background Maths Exponential Rules 1 $$ \begin{align} \label{eq:exponent_rule} g^{a-b} &= \dfrac{g^a}{g^b} \newline g^{a+b} &= g^a g^b \n...
| | jeremykun.wordpress.com
21.4 parsecs away

Travel
| This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes....