Well done! You've reached the end of my post. Now you can leave a comment or read something else.
Here are some random popular articles:
- - How to Backdoor Diffie-Hellman: quick explanation
- - Attacks on Ethereum Smart Contracts
- - Problems that UDP and only UDP has
- - Speed and Cryptography
- - Zero'ing memory, compiler optimizations and memset_s
- - How did length extension attacks made it into SHA-2?
- - TLS, Pre-Master Secrets and Master Secrets
Here are some random recent articles:
- - Some news from founding a startup (zkSecurity)
- - Are you into finding bugs and learning ZK? Here's a challenge for you
- - What are Schwartz-Zippel circuits? How do they relate to iterative constraint systems?
- - Mum, I was on the zkpodcast!
- - Interactive Arithmetization and Iterative Constraint Systems
- - What's out there for ECDSA threshold signatures
- - My company is looking for interns
Comments
leave a comment...