Toggle navigation
Daminha Blog
About
Tags
Cryptography Series
Note
Blog
Theme
All Blog Posts
All Blog Posts
Session Hijacking: Transferring Chrome Cookies and Bypassing Two-Factor Authentication (2FA)
July 2, 2025
Cryptography 2: Semantic Security Prevents Message Recovery Attacks — A Security Reduction Proof
April 8, 2025
Cryptography 1: Perfect Security and the Limits of Perfect Security
March 28, 2025
Decoding STARK: How to Prove Computation Accuracy Without Revealing the Data
November 9, 2024
Unlocking the Future of Blockchain: Exploring ZK-Rollups and zkEVM
October 23, 2024
Decoding CVE-2021-22659: How to Protect the MicroLogix 1400 from Attacks
October 12, 2024
From Merkle Trees to Ethereum: A Journey Through Blockchain Technology
October 7, 2024
Unmasking Cyber Threats: The Art of Phishing with Canarytokens and RTLO Attacks
September 3, 2024
Unraveling SNARKs: The Breakthrough Technology in Cryptography
August 24, 2024
The Math Behind the Magic: Exploring Arithmetic Circuits and Their Role in Zero-Knowledge Proofs
August 15, 2024
Unveiling the Secrets of Cryptography: From Polynomials to Pairings and Commitment Schemes
August 14, 2024
Understanding Zero Knowledge Proofs: Key Concepts and Applications
August 6, 2024
Extracting IP Addresses via Chat Apps: Zalo and Telegram
August 5, 2024
All Blog Posts
July 24, 2024
About Me
July 24, 2024