cryptography 11
View all
Cryptography 5: Stream Cipher Vulnerabilities and the Hybrid Argument
Cryptography 4: Constructing Secure Stream Ciphers from PRGs
Cryptography 3: Consequences and Interpretations of Semantic Security
Cryptography 2: Semantic Security Prevents Message Recovery Attacks — A Security Reduction Proof
Cryptography 1: Perfect Security and the Limits of Perfect Security
Decoding STARK: How to Prove Computation Accuracy Without Revealing the Data
From Merkle Trees to Ethereum: A Journey Through Blockchain Technology
Unraveling SNARKs: The Breakthrough Technology in Cryptography
The Math Behind the Magic: Exploring Arithmetic Circuits and Their Role in Zero-Knowledge Proofs
Unveiling the Secrets of Cryptography: From Polynomials to Pairings and Commitment Schemes
Understanding Zero Knowledge Proofs: Key Concepts and Applications
cybersecurity 7
View all
Cryptography 5: Stream Cipher Vulnerabilities and the Hybrid Argument
Process Injection: The Journey to Penetrate Windows' Protected Process Light Security Barrier
Session Hijacking: Transferring Chrome Cookies and Bypassing Two-Factor Authentication (2FA)
Cryptography 1: Perfect Security and the Limits of Perfect Security
Decoding CVE-2021-22659: How to Protect the MicroLogix 1400 from Attacks
Unmasking Cyber Threats: The Art of Phishing with Canarytokens and RTLO Attacks
Extracting IP Addresses via Chat Apps: Zalo and Telegram
zero-knowledge proofs 6
View all
Decoding STARK: How to Prove Computation Accuracy Without Revealing the Data
Unlocking the Future of Blockchain: Exploring ZK-Rollups and zkEVM
Unraveling SNARKs: The Breakthrough Technology in Cryptography
The Math Behind the Magic: Exploring Arithmetic Circuits and Their Role in Zero-Knowledge Proofs
Unveiling the Secrets of Cryptography: From Polynomials to Pairings and Commitment Schemes
Understanding Zero Knowledge Proofs: Key Concepts and Applications
blockchain 5
View all
Decoding STARK: How to Prove Computation Accuracy Without Revealing the Data
Unlocking the Future of Blockchain: Exploring ZK-Rollups and zkEVM
From Merkle Trees to Ethereum: A Journey Through Blockchain Technology
The Math Behind the Magic: Exploring Arithmetic Circuits and Their Role in Zero-Knowledge Proofs
Understanding Zero Knowledge Proofs: Key Concepts and Applications