RSS.Social

Cryptography and Privacy

follow: @[email protected]

Posts

Primefactor Cryptography R&D Lab

XChaCha20-Poly1305 Implementation

Poly1305

ChaCha20

Proxy Re-Encryption

Stealth Address

Adaptor Signature

Lagrange Interpolation

ECDSA Adaptor Signature

Two-Party ECDSA

Elliptic Curve Digital Signature Algorithm

Pedersen Commitment Scheme

Hash-Based Commitment Scheme

Oblivious Transfer

Blind Signature

BLS Signature Aggregation

BLS Signature

Elliptic Curve Pairing

Shamir's Secret Sharing

Ring Signature

Chaum-Pedersen Protocol

Schnorr Adaptor Signature

Schnorr Signature Aggregation

Schnorr Signature

Schnorr Identification Protocol

ElGamal Encryption

Entropy

Computational Security

Information-Theoretic Security

One-Time Pad

Security Notion

Probability

XOR

Substitution and Permutation

Confusion and Diffusion

Random Number Generator

Elliptic Curve Diffie-Hellman

Message Authentication Code

Hash Function

A High-level Overview of Modern Cryptography

How to implement LP-Tokens in Cairo

How to implement LP-Tokens in Solidity

How to implement LP-Tokens

How to calculate percentages in Solidity

Cryptography Resources