How do Bulletproofs avoid the trusted setup phase (part 1)?When you are just entering into the ZKP realm, digging into zk-SNARKs protocols such as Groth16, Plonk, Bulletproofs, etc, you may pose…Jun 17Jun 17
Why should we be ready for Quantum-Safe CryptographyQuantum computers are still in the early stages of development, and there are many technical challenges that need to be overcome before…Mar 10Mar 10
How a Quantum computer could break the RSA cryptosystemIn this tutorial, I will walk you through how a quantum computer can break the RSA cryptogsystem, a widely-used public key algorithm. The…Mar 10Mar 10
Zero-Knowledge Proof Learning Resources (a learning path)Zero-knowledge proof (ZKP) probably is currently the hottest topic in the cryptography world. The idea of proving that `something is true…Mar 10Mar 10
Công nghệ khối chuỗi— BlockchainPhần đầu của bài viết này iới thiệu khái quát về công nghệ khối chuỗi, nó hoạt động ra sao. Sau đó, bài viết sẽ tóm tắt các tất cả các mảng…Oct 17, 20171Oct 17, 20171