Skip to main content
All Topicssecurity

security

18 articles tagged with “security

Cryptography

Cryptographic primitives and techniques including hashing, digital signatures, elliptic curves, and zero-knowledge proofs.

conceptsintermediate1 min readUpdated 2025-10-03

Zero-Knowledge Proof

In America, citizens don't have ID numbers... and yet we live in a society that necessitates them.

conceptsadvanced3 min readUpdated 2023-03-31

Merkle Tree

Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.

conceptsadvanced3 min readUpdated 2023-01-12

BLS Digital Signatures

support the basic properties of digital signatures: proof that the:

conceptsadvanced3 min readUpdated 2023-01-09

Digital Signatures

Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.

conceptsadvanced5 min readUpdated 2023-01-08

KZG Commitments

Elliptic curve cryptography looks unapproachable, but it's totally understandable with a decent amount of high school algebra.

conceptsadvanced5 min readUpdated 2022-12-08

commit

This is part 1 of a 3 part series on KZG Commitments. Here are links to part 2, part 3 and the summary article.

conceptsadvanced5 min readUpdated 2022-12-07

Commitment Schemes

Let's say you have a large amount of data that, for whatever reason, is private.

conceptsadvanced4 min readUpdated 2022-12-07

Diffie-Hellman Key Exchange

When you divide two integers, sometimes the result is not an integer (eg has a reminder). is a branch of math that is focused on the reminder.

conceptsadvanced4 min readUpdated 2022-12-07

Elliptic Curve Pairings

This is part of a series on elliptic curve cryptography and its applications for Ethereum.

conceptsadvanced6 min readUpdated 2022-12-07

Hash Functions

The purpose of a hash function is to transform any amount of data into a compact, uniform value.

conceptsadvanced2 min readUpdated 2022-12-07

open

This is part 2 of a 3 part series on KZG Commitments. Here are links to part 1, part 3 and the summary article.

conceptsadvanced3 min readUpdated 2022-12-07

PCS Trusted Setup

This is part of a series on elliptic curve cryptography and its applications for Ethereum.

conceptsadvanced4 min readUpdated 2022-12-07

Polynomial Commitments

Applying a takes data (of arbitrary contents and size) and reduces it to a unique, compact string.

conceptsadvanced3 min readUpdated 2022-12-07

verify

This is part 3 of a 3 part series on KZG Commitments. Here are links to part 1, part 2 and the summary article.

conceptsadvanced5 min readUpdated 2022-12-07

Verkle Tree

A is creates a commitment that is anchored to a piece of data.

conceptsadvanced6 min readUpdated 2022-12-07

RANDAO

BLS Digital Signatures A method of generating ; digital signatures appear as random data (there is no way to discover anything about the signer with just the signature.

ethereumadvanced5 min readUpdated 2022-12-07