Estimating the Security of Ring Learning with Errors (RLWE)
Published:
Link to article. I wrote a guest post on Jeremy Kun’s website, that discusses how to estimate the security of Ring Learning With Errors (RLWE) based schemes.
Published:
Link to article. I wrote a guest post on Jeremy Kun’s website, that discusses how to estimate the security of Ring Learning With Errors (RLWE) based schemes.
Published:
Link to Medium post. I try (and fail) to break RSA Blind Signatures, while working on a cryptography security review for Google One’s VPN service.
Published:
Link to Medium post. I try (and fail) to break RSA Blind Signatures, while working on a cryptography security review for Google One’s VPN service.
Published:
Link to Medium post. I try (and fail) to break RSA Blind Signatures, while working on a cryptography security review for Google One’s VPN service.
Published:
Link to Medium post. I try (and fail) to break RSA Blind Signatures, while working on a cryptography security review for Google One’s VPN service.
Published:
Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.
Published:
Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.
Published:
Link to Medium post. I discuss how to use Rust’s memory model to implement session types, which is useful for enforcing correct state transitions in multi-party computation protocols.
Published:
Link to Medium post. My fall season in Yosemite was stacked with great friends, big adventures, and rad climbing! There is no cryptography in this blog post.
Published:
Link to Medium post. Julie and I climbed the Nose on El Capitan! There is no cryptography in this blog post.
Published:
Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.
Published:
Link to article. I wrote a guest post on Jeremy Kun’s website, that discusses how to estimate the security of Ring Learning With Errors (RLWE) based schemes.
Published:
Link to article. I wrote a guest post on Jeremy Kun’s website, that discusses how to estimate the security of Ring Learning With Errors (RLWE) based schemes.
Published:
Link to Medium post. I discuss how to use Rust’s memory model to implement session types, which is useful for enforcing correct state transitions in multi-party computation protocols.
Published:
Link to article. I wrote a guest post on Jeremy Kun’s website, that discusses how to estimate the security of Ring Learning With Errors (RLWE) based schemes.
Published:
Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.
Published:
Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.
Published:
Link to Medium post. I discuss how to use Rust’s memory model to implement session types, which is useful for enforcing correct state transitions in multi-party computation protocols.
Published:
Link to Medium post. I discuss how to use Rust’s memory model to implement session types, which is useful for enforcing correct state transitions in multi-party computation protocols.
Published:
Link to Medium post. My fall season in Yosemite was stacked with great friends, big adventures, and rad climbing! There is no cryptography in this blog post.
Published:
Link to Medium post. Julie and I climbed the Nose on El Capitan! There is no cryptography in this blog post.
Published:
Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.
Published:
Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.