Archive Show All33 AES1 C1 Eucalyptus2 OpenSSL1 accumulators5 aggregation6 assumptions1 authenticated dictionaries1 bilinear accumulators1 bilinear maps5 bls2 books1 cryptography2 diophantine equations1 distributed key generation3 dkg3 ego1 encryption2 falsifiable1 fast fourier transform5 feynman1 fft5 gcd1 group theory2 hidden-order groups4 interpolation1 kzg4 lagrange2 matrix multiplication1 merkle3 multilinear maps1 non-membership1 number theory2 papers4 polynomial commitments4 polynomials8 range proofs1 rsa5 schnorr1 science1 secret sharing1 security proofs1 shamir1 signatures3 stateless validation2 toeplitz2 transparency logs1 trusted setup1 tutorials4 vc6 vector1 vector commitments6 verifiable secret sharing1 vss1 zero knowledge1 2024 Jun 13Keyless blockchain accounts on Aptos May 31Schnorr signatures: everything you wanted to know, but were afraid to ask! May 02What in the Smurf is a silent-setup multiverse unpredictable function? May 01Baird et al.'s unique threshold signature scheme Apr 26How to reshare a secret 2023 Jun 02Science: Process, not Truth Feb 05Why you should probably never sort your Merkle tree's leaves Jan 08Pairing-based anonymous credentials and the power of re-randomization 2022 Dec 31Pairings or bilinear maps Nov 18Hyperproofs: Faster Merkle proof aggregation without SNARKs Aug 27Are there cryptographic accumulators without trusted setup? Jul 28Lagrange interpolation 2021 Jun 17Feist-Khovratovich technique for computing KZG proofs fast Apr 15Basic number theory Feb 25What is a Merkle tree? 2020 Nov 26Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Nov 24Catalano-Fiore Vector Commitments Nov 24RSA Accumulators Nov 23Linear Diophantine equations Nov 05Cryptographic Assumptions in Hidden-Order Groups May 06Kate-Zaverucha-Goldberg (KZG) Constant-Sized Polynomial Commitments May 06Aggregatable Subvector Commitments for Stateless Cryptocurrencies from Lagrange Polynomials Apr 02Bilinear Accumulators for Cryptocurrency Enthusiasts Mar 19Multiplying a Toeplitz matrix by a vector Mar 16Basics of Polynomials for Cryptography Mar 12Towards Scalable Verifiable Secret Sharing and Distributed Key Generation Mar 12Fast and Scalable BLS Threshold Signatures Mar 03Range Proofs from Polynomial Commitments, Re-explained Jan 23"Ego is the enemy", by Ryan Holiday 2015 Sep 14How to give (and make) a presentation 2013 Jul 21How to compile and install Eucalyptus 3.3.0 on Ubuntu 13.04 from Github sources (cloud-in-a-box) Feb 19How to compile and install Eucalyptus 3.2.0 on Ubuntu 12.04/12.10 from Github sources (cloud-in-a-box) 2012 Aug 25How to encrypt a file using AES in 256-bit CBC/CTR mode using OpenSSL in C