cryptography
A place to discuss the math that secures the world. Message @ncitron.eth for an invite.
Julie pfp

@bbjubjub.eth

a very random christmas!
0 reply
0 recast
3 reactions

Mantej Rajpal pfp

@mantej

never thought about this https://open.substack.com/pub/bfswa/p/6-years-after-too-much-crypto
0 reply
0 recast
1 reaction

Mantej Rajpal pfp

@mantej

What are some interesting and pragmatic topics in cryptography that you wish people wrote about more?
3 replies
0 recast
1 reaction

Mantej Rajpal pfp

@mantej

In 2001, quantum computers factored the number 15. It’s now 2025, and quantum computers haven’t yet factored the number 21. https://algassert.com/post/2500
0 reply
1 recast
3 reactions

Mantej Rajpal pfp

@mantej

Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break. —Bruce Schneier (“Memo to the Amateur Cipher Designer”, 1998)
1 reply
0 recast
7 reactions

Julie pfp

@bbjubjub.eth

https://farcaster.xyz/bbjubjub.eth/0x5d4aabcd
0 reply
0 recast
0 reaction

EulerLagrange pfp

@eulerlagrange.eth

https://farcaster.xyz/karma/0x9e9a2f13
1 reply
0 recast
1 reaction

Julie pfp

@bbjubjub.eth

stealth addresses yes please https://x.com/ETHGlobal/status/1941863222640095460
0 reply
0 recast
2 reactions

EulerLagrange pfp

@eulerlagrange.eth

https://x.com/sweis/status/1924494484886507557?s=46
1 reply
0 recast
11 reactions

cyrus pfp

@cyrus

Someone just shared this really fun 'cryptography by hand' tool with me and makes me wonder what else is out there for more tangible/non-screen based ways of understanding the tech behind blockchain? https://blog.blockstream.com/codex32-a-shamir-secret-sharing-scheme/
0 reply
0 recast
2 reactions

Mantej Rajpal pfp

@mantej

Google is integrating zk into Google Wallet https://blog.google/products/google-pay/google-wallet-age-identity-verifications/
2 replies
0 recast
17 reactions

⟠ ichristwin〔▸‿◂〕 pfp

@ichristwin.eth

TIL; Instead of monotonic nonces, I can just use nonces in dynamic accumulators to prevent double-spends/replay-attacks on the M3tering protocol. Here is the best part!! 😁 - ✨ The validity of messages will no longer depend on ordering ✨ - only requires the same constant-size state like in the monotonic nonce implementation - message validation only requires public parameters and anyone can easily validate messages given these parameters. . 😮‍💨 Monotonic nonces have been a pain in the butt for our usecase (in embedded systems that stream large volumes of data in near real time). Because ordering matters here, any missing message in the stream makes all subsequent massages invalid (ie: once you reset the nonce on device to the last valid nonce, subsequent nonces gets replayed, and the protocol is forced to drop a stream of data that would have otherwise been valid)
0 reply
1 recast
5 reactions

polymutex pfp

@polymutex.eth

What use-cases would be enabled by a network of distributed, mutually-verifying TEEs with high availability, and MPC between them? Does such a network already exist?
2 replies
0 recast
4 reactions

✳️ dcposch pfp

@dcposch.eth

This is many things including: an incredible endorsement of Signal
1 reply
3 recasts
24 reactions

HH pfp

@hamud

https://www.youtube.com/watch?v=zmxMh06OtXc
0 reply
0 recast
2 reactions