Cryptography
Cryptographic primitives and techniques including hashing, digital signatures, elliptic curves, and zero-knowledge proofs.
Cryptographic primitives and techniques including hashing, digital signatures, elliptic curves, and zero-knowledge proofs.
In America, citizens don't have ID numbers... and yet we live in a society that necessitates them.
Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.
support the basic properties of digital signatures: proof that the:
Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.
Elliptic curve cryptography looks unapproachable, but it's totally understandable with a decent amount of high school algebra.
This is part 1 of a 3 part series on KZG Commitments. Here are links to part 2, part 3 and the summary article.
Let's say you have a large amount of data that, for whatever reason, is private.
When you divide two integers, sometimes the result is not an integer (eg has a reminder). is a branch of math that is focused on the reminder.
Before we begin, a quick note.
This is part of a series on elliptic curve cryptography and its applications for Ethereum.
The purpose of a hash function is to transform any amount of data into a compact, uniform value.
This is part 2 of a 3 part series on KZG Commitments. Here are links to part 1, part 3 and the summary article.
This is part of a series on elliptic curve cryptography and its applications for Ethereum.
Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.
This is part 3 of a 3 part series on KZG Commitments. Here are links to part 1, part 2 and the summary article.
A is creates a commitment that is anchored to a piece of data.
BLS Digital Signatures A method of generating ; digital signatures appear as random data (there is no way to discover anything about the signer with just the signature.