Cryptography and Privacy
Primefactor Cryptography R&D Lab
XChaCha20-Poly1305 Implementation
Poly1305
ChaCha20
Proxy Re-Encryption
Stealth Address
Adaptor Signature
Lagrange Interpolation
ECDSA Adaptor Signature
Two-Party ECDSA
Elliptic Curve Digital Signature Algorithm
Pedersen Commitment Scheme
Hash-Based Commitment Scheme
Oblivious Transfer
Blind Signature
BLS Signature Aggregation
BLS Signature
Elliptic Curve Pairing
Shamir's Secret Sharing
Ring Signature
Chaum-Pedersen Protocol
Schnorr Adaptor Signature
Schnorr Signature Aggregation
Schnorr Signature
Schnorr Identification Protocol
ElGamal Encryption
Entropy
Computational Security
Information-Theoretic Security
One-Time Pad
Security Notion
Probability
XOR
Substitution and Permutation
Confusion and Diffusion
Random Number Generator
Elliptic Curve Diffie-Hellman
Message Authentication Code
Hash Function
A High-level Overview of Modern Cryptography
How to implement LP-Tokens in Cairo
How to implement LP-Tokens in Solidity
How to implement LP-Tokens
How to calculate percentages in Solidity
Cryptography Resources