Decentralized meta-learning
  • Bitcoin
    4. Segwit transaction 3. Segwit address 2. Bitcoin transaction 1. Bitcoin address
  • Cryptography
    RSA ElGamal ECDSA Schnorr EC-Schnorr Zero knowledge proofs Elliptic curves Commitment schemes Hash functions BLS
  • Coins
    Ethereum address Monero address Iota address
  • Emacs
    Completion system In-file navigation Files/buffers navigation From Jekyll to Hugo Organizing work/life projects
  • Finance
    Interest Rate Black-Scholes formula Options Greeks Historical Volatility Linear & Log Returns
  • Linux
    3. Use Linux kernel module 2. Config Linux kernel module 1. Write Linux kernel module From HDD to SSD w/ EFI Back to my first love Package management Config management SSH keys on USB Firewall, monitor, ban. Repeat. 1. Personal Email server 2. Personal DNS server
  • Math
    Complexities with graphs Algebraic structures Ternary (Trinary) system Bias vs. variance
  • Open Source
    Bitmex-API Actihunt Deribit-API 3DP Huveragy G2: web app
  • Trading
    Weekly Monthly Close Slices of Bitcoin Month Breaks COVID-19 indicators Hedge Fund Market Wizards book Session breaks Whale alert New Market Wizards book Price breaks indicator Chess vs Trading Reminiscences of ... a loss
  • Travel
    4. G2: aftermath 3. G2: compare gear 2. G2: gear list 1. G2: training plan First USA visit Coworking spaces High-end Maldives Diving Palawan Backpacking Vietnam Surviging Bali 1. Annapurna Circuit: the plan 2. Annapurna Circuit: the gear 3. Annapurna Circuit: the training 4. Annapurna Circuit: the afthermath
  • Tags
  • About
Decentralized meta-learning

cryptography


BLS signature scheme

Cryptography

 Posted on June 28, 2022  |  3 minutes  |  602 words  |  Iulian Costan

From a high level perspective this is how BLS (also known as Boneh–Lynn–Shacham) signature scheme works. [Read More]
cryptography  bls  pairings 

Hash functions

Cryptography

 Posted on September 15, 2020  |  6 minutes  |  1068 words  |  Iulian Costan

In simple terms, hash functions transform input data of arbitrary size (e.g. text, binary, etc) to fixed-length output (called hash value, hash code, fingerprint, message digest or simply hash) in a deterministic way. [Read More]
cryptography  hash  digest  mdc  mac  preimage  collision 

Commitment schemes

Cryptography

 Posted on February 25, 2020  |  8 minutes  |  1639 words  |  Iulian Costan

A cryptographic commitment scheme is a way of committing to a statement without revealing the statement itself or reveal it at a later time. [Read More]
cryptography  commitment  scheme  pedersen  elgamal  elliptic-curve 

Elliptic curves

Cryptography

 Posted on September 25, 2019  |  5 minutes  |  1030 words  |  Iulian Costan

The easiest way to understand Elliptic Curve (EC), point addition, scalar multiplication and trapdoor function; explained with simple graphs and animations. [Read More]
cryptography  elliptic-curve  math  sagemath  python 

Zero-knowledge proofs

Cryptography

 Posted on August 26, 2019  |  7 minutes  |  1481 words  |  Iulian Costan

Zero-knowledge is a method to prove that you know a secret ``x`` (e.g. a password, private key, piece of knowledge, etc) without revealing that secret. [Read More]
cryptography  zero-knowledge-proof  math  python  zcash 

Zero-knowledge proofs

Cryptography

 Posted on August 26, 2019  |  7 minutes  |  1416 words  |  Iulian Costan

— layout: post title: "Zero-knowledge proofs" subtitle: Cryptography date: 2019-08-26 tags: ["cryptography", "zero-knowledge-proof", "math", "python", "zcash"] — [Read More]
cryptography  zero-knowledge-proof  python  math 

EC-Schnorr

Cryptography

 Posted on June 25, 2019  |  4 minutes  |  662 words  |  Iulian Costan

Overview EC-Schnorr, as the name suggests, is a Schnorr-type digital signature scheme over elliptic curve, it's ECDSA's little sister and Schnorr's big brother implemented in the upcoming MuSig in Bitcoin. [Read More]
cryptography  schnorr  ellipticcurve  math  python  sagemath 

Schnorr

Cryptography

 Posted on June 19, 2019  |  3 minutes  |  556 words  |  Iulian Costan

Schnorr is another digital signature scheme known for its simplicity, no division, no inversion, just plain old multiplication. [Read More]
cryptography  schnorr  discrete-logarithm  math  sagemath 

ECDSA

Cryptography

 Posted on April 9, 2019  |  4 minutes  |  818 words  |  Iulian Costan

Elliptic curve cryptography (ECC) and digital signature algorithm (ECDSA) are more complex than RSA or ElGamal but I will try my best to hide the hairy math and the implementation details. [Read More]
cryptography  ecdsa  discrete-logarithm  math  eli5  python  sagemath 

ElGamal

Cryptography

 Posted on March 26, 2019  |  4 minutes  |  816 words  |  Iulian Costan

ElGamal is a public key cryptosystem that is used in encryption , digital signature and homomorphic cryptography. [Read More]
cryptography  elgamal  discrete-logarithm  math  eli5  python 
  • Older Posts →

Iulian Costan  • © 2023  •  Decentralized meta-learning

Hugo v0.109.0 powered  •  Theme Beautiful Hugo adapted from Beautiful Jekyll