In the realm of cryptography, data security and privacy have become paramount concerns. As we increasingly rely on digital communication … More
Author: Sefik Serengil
A Step by Step Partially Homomorphic Encryption Example with Naccache-Stern In Python
In the ever-evolving landscape of cybersecurity, encryption plays a pivotal role in safeguarding sensitive information. One intriguing facet of encryption … More
A Step by Step Partially Homomorphic Encryption Example with Damgard-Jurik in Python
In the world of data security and privacy, encryption plays a pivotal role in safeguarding sensitive information from prying eyes. … More
A Step by Step Partially Homomorphic Encryption Example with Okamoto–Uchiyama in Python
In today’s rapidly evolving digital landscape, the need for secure data transmission and storage has never been more critical. To … More
Use Cases of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the mathematics of elliptic curves to … More
Elliptic Curve Cryptography vs The Other Public Key Algorithms
Elliptic curve cryptography or shortly ECC has several advantages over traditional public key cryptography algorithms such as RSA, ElGamal, and … More
A Step by Step Partially Homomorphic Encryption Example with Benaloh in Python From Scratch
In an age where data privacy and security are paramount, encryption plays a pivotal role in safeguarding sensitive information. One … More
Elliptic Curve Cryptography in Post Quantum Age
Quantum computers have the potential to break certain types of elliptic curve cryptography (ECC) algorithms that are based on the … More
Which Cryptocurrency Adopts Which Digital Signature Algorithm
In this post, I’d like to talk to you about the digital signature algorithms used in cryptocurrencies and their importance … More
Exploring Euler’s Totient Function’s Role in the Paillier
In the world of cryptography, where the protection of sensitive information is paramount, mathematicians and cryptographers have devised ingenious methods … More