Well done! You've reached the end of my post. Now you can leave a comment or read something else.
Here are some random popular articles:
- - Schnorr's Signature and non-interactive Protocols
- - Common x509 certificate validation/creation pitfalls
- - On Doing Research
- - Maybe you shouldn't skip SHA-3
- - Key Compromise Impersonation attacks (KCI)
- - Proof of Elgamal's semantic security using a reduction to DDH
- - Problems that UDP and only UDP has
Here are some random recent articles:
- - First zksecurity public report is out!
- - Two And A Half Coins #8 - Consensus protocols, Bitcoin, Fastpay, and Linera with Mathieu Baudet
- - Don't go in debt, and other mistakes not to make when receiving stocks or crypto tokens as payment
- - Two And A Half Coins #7 - It's time to talk about Ethereum
- - Two And A Half Coins: Exploring Layer 2 Solutions on Bitcoin with Kevin Hurley and Alex Akselrod
- - The trap of the top-down approach
- - A note on the elliptic curve pairing checks in zero-knowledge proofs
Comments
leave a comment...