In today’s rapidly evolving digital landscape, the need for secure data transmission and storage has never been more critical. To … More
Author: Sefik Serengil
Use Cases of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the mathematics of elliptic curves to … More
Elliptic Curve Cryptography vs The Other Public Key Algorithms
Elliptic curve cryptography or shortly ECC has several advantages over traditional public key cryptography algorithms such as RSA, ElGamal, and … More
A Step by Step Partially Homomorphic Encryption Example with Benaloh in Python From Scratch
In an age where data privacy and security are paramount, encryption plays a pivotal role in safeguarding sensitive information. One … More
Elliptic Curve Cryptography in Post Quantum Age
Quantum computers have the potential to break certain types of elliptic curve cryptography (ECC) algorithms that are based on the … More
Which Cryptocurrency Adopts Which Digital Signature Algorithm
In this post, I’d like to talk to you about the digital signature algorithms used in cryptocurrencies and their importance … More
Exploring Euler’s Totient Function’s Role in the Paillier
In the world of cryptography, where the protection of sensitive information is paramount, mathematicians and cryptographers have devised ingenious methods … More
Understanding Identity Element in Elliptic Curves
One of the key concepts in elliptic curve theory is the point at infinity, also known as the neutral element … More
A Gentle Proof of Why Euler’s Totient Function is Multiplicative
RSA cryptosystem is mainly based on the multiplicative feature of Euler’s totient function. In this blog post, we embark on … More
ECDSA vs EdDSA
Elliptic Curve Digital Signature Algorithm or shortly ECDSA and Edwards-curve Digital Signature Algorithm or shortly EdDSA are both public-key digital … More