Decentralized meta-learning
  • Bitcoin
    4. Segwit transaction 3. Segwit address 2. Bitcoin transaction 1. Bitcoin address
  • Cryptography
    RSA ElGamal ECDSA Schnorr EC-Schnorr Zero knowledge proofs Elliptic curves Commitment schemes Hash functions BLS
  • Coins
    Ethereum address Monero address Iota address
  • Emacs
    Completion system In-file navigation Files/buffers navigation From Jekyll to Hugo Organizing work/life projects
  • Elixir
    Functional architecture The Power of Mnesia Testing Elixir
  • Finance
    Interest Rate Black-Scholes formula Options Greeks Historical Volatility Linear & Log Returns Risk-adjusted metrics
  • Linux
    3. Use Linux kernel module 2. Config Linux kernel module 1. Write Linux kernel module From HDD to SSD w/ EFI Back to my first love Package management Config management SSH keys on USB Firewall, monitor, ban. Repeat. Wildcard SSL certificate SSL-offloader for Dokku 1. Personal Email server 2. Personal DNS server 3. Personal VPN server
  • Science
    Complexities with graphs Algebraic structures Ternary (Trinary) system Bias vs. variance 5kW off-grid photovoltaic system
  • Open Source
    Bitmex-API Actihunt Deribit-API 3DP Huveragy G2: web app
  • Trading
    Reminiscences of ... a loss Chess vs Trading Weekly Monthly Close Month Breaks Outlier changes alert Hedge Fund Market Wizards book Session breaks Whale alert New Market Wizards book Price breaks indicator Click, Percent, Zscore changes COVID-19 indicators
  • Travel
    4. Gasherbrum2: aftermath 3. Gasherbrum2: compare gear 2. Gasherbrum2: gear list 1. Gasherbrum2: training plan First USA visit Coworking spaces High-end Maldives Diving Palawan Backpacking Vietnam Surviging Bali 1. Annapurna Circuit: the plan 2. Annapurna Circuit: the gear 3. Annapurna Circuit: the training 4. Annapurna Circuit: the afthermath
  • Tags
  • About
Decentralized meta-learning

Cryptography


BLS signature scheme

Cryptography

 Posted on June 28, 2022  |  3 minutes  |  602 words  |  

From a high level perspective this is how BLS (also known as Boneh–Lynn–Shacham) signature scheme works.

/img/bls/bls.png

[Read More]
cryptography  bls  pairings 

Hash functions

Cryptography

 Posted on September 15, 2020  |  6 minutes  |  1068 words  |  

In simple terms, hash functions transform input data of arbitrary size (e.g. text, binary, etc) to fixed-length output (called hash value, hash code, fingerprint, message digest or simply hash) in a deterministic way. What else?

[Read More]
cryptography  hash  digest  mdc  mac  preimage  collision 

Commitment schemes

Cryptography

 Posted on February 25, 2020  |  8 minutes  |  1639 words  |  

A cryptographic commitment scheme is a way of committing to a statement without revealing the statement itself or reveal it at a later time.

[Read More]
cryptography  commitment  scheme  pedersen  elgamal  elliptic-curve 

Elliptic curves

Cryptography

 Posted on September 25, 2019  |  5 minutes  |  1030 words  |  

The easiest way to understand Elliptic Curve (EC), point addition, scalar multiplication and trapdoor function; explained with simple graphs and animations.

[Read More]
cryptography  elliptic-curve  math  sagemath  python 

Zero-knowledge proofs

Cryptography

 Posted on August 26, 2019  |  7 minutes  |  1481 words  |  

Zero-knowledge is a method to prove that you know a secret ``x`` (e.g. a password, private key, piece of knowledge, etc) without revealing that secret.

[Read More]
cryptography  zero-knowledge-proof  math  python  zcash 

Zero-knowledge proofs

Cryptography

 Posted on August 26, 2019  |  7 minutes  |  1416 words  |  

— layout: post title: "Zero-knowledge proofs" subtitle: Cryptography date: 2019-08-26 tags: ["cryptography", "zero-knowledge-proof", "math", "python", "zcash"] —

[Read More]
cryptography  zero-knowledge-proof  python  math 

EC-Schnorr

Cryptography

 Posted on June 25, 2019  |  4 minutes  |  662 words  |  

Overview

EC-Schnorr, as the name suggests, is a Schnorr-type digital signature scheme over elliptic curve, it's ECDSA's little sister and Schnorr's big brother implemented in the upcoming MuSig in Bitcoin.

[Read More]
cryptography  schnorr  ellipticcurve  math  python  sagemath 

Schnorr

Cryptography

 Posted on June 19, 2019  |  3 minutes  |  556 words  |  

Schnorr is another digital signature scheme known for its simplicity, no division, no inversion, just plain old multiplication. Here is my simple 16 lines implementation in Python.

[Read More]
cryptography  schnorr  discrete-logarithm  math  sagemath 

ECDSA

Cryptography

 Posted on April 9, 2019  |  4 minutes  |  818 words  |  

Elliptic curve cryptography (ECC) and digital signature algorithm (ECDSA) are more complex than RSA or ElGamal but I will try my best to hide the hairy math and the implementation details.

[Read More]
cryptography  ecdsa  discrete-logarithm  math  eli5  python  sagemath 

ElGamal

Cryptography

 Posted on March 26, 2019  |  4 minutes  |  816 words  |  

ElGamal is a public key cryptosystem that is used in encryption , digital signature and homomorphic cryptography.

Here is my take in 12 lines of Python code:

[Read More]
cryptography  elgamal  discrete-logarithm  math  eli5  python 
  • Older Posts →

 • © 2025  •  Decentralized meta-learning

Hugo v0.140.2 powered  •  Theme Beautiful Hugo adapted from Beautiful Jekyll