Best Crypto Libraries for Python DevelopersThis post provides some high-level introductions to cryptography libraries widely used in Python.Jan 31Jan 31
How do Bulletproofs avoid the trusted setup phase (part 2)?What is Bulletproofs?Jun 18, 2024Jun 18, 2024
How do Bulletproofs avoid the trusted setup phase (part 1)?When you are just entering into the ZKP realm, digging into zk-SNARKs protocols such as Groth16, Plonk, Bulletproofs, etc, you may pose…Jun 17, 2024Jun 17, 2024
What happens in the trusted setup phase of the Groth16 protocolThe Groth16 ProtocolApr 22, 20242Apr 22, 20242
Why should we be ready for Quantum-Safe CryptographyQuantum computers are still in the early stages of development, and there are many technical challenges that need to be overcome before…Mar 10, 2024Mar 10, 2024
How a Quantum computer could break the RSA cryptosystemIn this tutorial, I will walk you through how a quantum computer can break the RSA cryptogsystem, a widely-used public key algorithm. The…Mar 10, 2024Mar 10, 2024
Zero-Knowledge Proof Learning Resources (a learning path)Zero-knowledge proof (ZKP) probably is currently the hottest topic in the cryptography world. The idea of proving that `something is true…Mar 10, 2024Mar 10, 2024