Open in app

Sign In

Write

Sign In

Victor Genin
Victor Genin

25 Followers

Home

About

Jan 1

Cryptographic Key Exchange

We previously discussed the difference between symmetric and asymmetric encryption, and today we’ll talk about how the keys are actually exchanged. In general, cryptographic key exchange or encrypted key exchange (EKE) protocols work by allowing the two parties to generate a shared secret without revealing the secret to any third…

Cryptography

7 min read

Cryptographic Key Exchange
Cryptographic Key Exchange
Cryptography

7 min read


Dec 13, 2022

Security enclaves, TEE and other creatures

A trusted execution environment, or TEE, is a secure area of a computer’s hardware or software that is used to store and execute sensitive data and code, protecting the sensitive information and code from being accessed by unauthorized parties or modified in any way. A security enclave is a similar…

Security

8 min read

Security enclaves, TEE and other creatures
Security enclaves, TEE and other creatures
Security

8 min read


Nov 7, 2022

Deep dive into Elliptic Curve Signatures

To popular demand, I have decided to try and explain how the ECDSA algorithm works. We’ve discussed a bit about elliptic curve signatures before and a little bit more after that, but it seems it’s never enough. Admittedly, I’ve been struggling a bit to understand it properly and while I…

Cryptography

11 min read

Deep dive into Elliptic Curve Signatures
Deep dive into Elliptic Curve Signatures
Cryptography

11 min read


Oct 20, 2022

Multisig vs Shamir’s Secret Sharing Scheme

In the previous article we’ve discussed about multisig deployment and how it can greatly improve the project’s security throughout the development cycle. Today we’ll discussed even further improvements into key sharing schemes and start with Shamir’s Secret Sharing Scheme (SSSS) Shamir’s Secret Sharing Scheme is related to the broader concept…

Cybersecurity

5 min read

Multisig vs Shamir’s Secret Sharing Scheme
Multisig vs Shamir’s Secret Sharing Scheme
Cybersecurity

5 min read


Sep 13, 2022

Blockchain Data Oracles

Oracles were individuals who were believed to be able to communicate with the gods and provide prophecies and guidance to people. …

Blockchain

5 min read

Blockchain Data Oracles
Blockchain Data Oracles
Blockchain

5 min read


Aug 26, 2022

Decentralised Storage with Arweave

Arweave introduces an entirely new economic model to the market, one that was never possible before the advent of permissionless crypto networks: permanent storage. It addresses this by requiring miners to refer to data that was previously stored, proving they still have it. …

Data

5 min read

Decentralised Storage with Arweave
Decentralised Storage with Arweave
Data

5 min read


Jul 20, 2022

Cryptographic Keys and Transaction Signatures

Security keys are used almost everywhere within Ethereum during user interactions, and the Ethereum address is derived from the private key. In other words, the Ethereum address is the last 20 bytes of hash of the public key controlling the account with 0x appended in front. How are Ethereum addresses generated? There are three main…

Ethereum

5 min read

Cryptographic Keys and Transaction Signatures
Cryptographic Keys and Transaction Signatures
Ethereum

5 min read


Jun 9, 2022

Ethereum Scaling with Rollups

As the number of people using Ethereum has grown, the blockchain has reached certain capacity limitations. This has driven up the cost of using the network, creating the need for “scaling solutions.” There are multiple solutions being researched, tested and implemented that take different approaches to achieve similar goals. The…

Ethereum

5 min read

Ethereum Scaling with Rollups
Ethereum Scaling with Rollups
Ethereum

5 min read


May 17, 2022

Elliptic Curve Signatures — extended

Asymmetric cryptography is one of the most important computer science inventions of the previous century. Cryptography is used extensively within Ethereum, and one place that users have contact with it is via Ethereum accounts. As we discussed in the previous article, public key cryptography is based on mathematical functions that…

Cybersecurity

5 min read

Elliptic Curve Signatures — extended
Elliptic Curve Signatures — extended
Cybersecurity

5 min read


Apr 19, 2022

Non-Fungible Tokens (NFTs) 101

Non-Fungible Tokens (NFTs) have captured the imaginations of collectors, investors, and tech enthusiasts alike, and if your interest in NFTs and blockchain technology is growing, you will want to learn more about NFT standards. However, before you read more, if you aren’t familiar with NFTs and want to learn more…

Ethereum

5 min read

Non-Fungible Tokens (NFTs) 101
Non-Fungible Tokens (NFTs) 101
Ethereum

5 min read

Victor Genin

Victor Genin

25 Followers
Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • ARPA Official

    ARPA Official

  • umair haque

    umair haque

  • Tim Andersen, Ph.D.

    Tim Andersen, Ph.D.

  • Darwinia

    Darwinia

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech