Phong LeHow do Bulletproofs avoid the trusted setup phase (part 1)?When you are just entering into the ZKP realm, digging into zk-SNARKs protocols such as Groth16, Plonk, Bulletproofs, etc, you may pose…Jun 17Jun 17
Phong LeWhat happens in the trusted setup phase of the Groth16 protocolThe Groth16 ProtocolApr 222Apr 222
Phong LeWhy should we be ready for Quantum-Safe CryptographyQuantum computers are still in the early stages of development, and there are many technical challenges that need to be overcome before…Mar 10Mar 10
Phong LeHow a Quantum computer could break the RSA cryptosystemIn this tutorial, I will walk you through how a quantum computer can break the RSA cryptogsystem, a widely-used public key algorithm. The…Mar 10Mar 10
Phong LeZero-Knowledge Proof Learning Resources (a learning path)Zero-knowledge proof (ZKP) probably is currently the hottest topic in the cryptography world. The idea of proving that `something is true…Mar 10Mar 10
Phong LeDiffie-Hellman Key Agreement ProtocolWhat is a Key agreement protocol?Apr 26, 2022Apr 26, 2022
Phong LeCông nghệ khối chuỗi— BlockchainPhần đầu của bài viết này iới thiệu khái quát về công nghệ khối chuỗi, nó hoạt động ra sao. Sau đó, bài viết sẽ tóm tắt các tất cả các mảng…Oct 17, 20171Oct 17, 20171