Skip to content

  • Twitter

  • Youtube

  • GitHub

  • Linkedin

  • Facebook

  • Instagram

  • RSS

  • Mail

Sefik Ilkin Serengil

Code wins arguments

  • Home
  • About Me
  • Publications
  • Courses
  • Talks
  • Consultancy

Category: Cryptography

A Gentle Introduction to Elliptic Curve Pairings in Ethereum with Python

Ethereum is often associated with smart contracts, decentralized finance, and scalability discussions, but underneath all of that lies a deep … More

elliptic curve cryptography, ethereum, pairing-based cryptography

A Step by Step Somewhat Homomorphic Encryption Example with Boneh-Goh-Nissim In Python

Encryption schemes have evolved tremendously over the past decades, and homomorphic encryption (HE) is one of the most fascinating areas. … More

elliptic curve, elliptic curve cryptography, homomorphic, partially homomorphic, somewhat homomorphic

A Step by Step Partially Homomorphic Sander-Young-Yung Example In Python

Modern cryptography is not only about protecting data from unauthorized access, but also about enabling computation on encrypted information. This … More

homomorphic

Digital Signatures In Python

Digital signatures play a crucial role in securing data integrity and authenticity across modern systems. Whether it’s signing documents, verifying … More

digital signature, python

Elliptic Curve Cryptography In Python

Elliptic Curve Cryptography (ECC) has become a cornerstone of modern cryptographic systems. From signing blockchain transactions to securing encrypted messaging, … More

elliptic curve, python

A Gentle Introduction to Elliptic Curves Over Binary Fields

Elliptic curves are a fascinating and important mathematical concept, widely used in cryptography. In most cryptographic applications, elliptic curves are … More

elliptic curve, homomorphic

Breaking RSA’s Hegemony: Elliptic Curve Cryptography in GPG’s New Defaults

In the world of cryptography, few algorithms have held as much dominance and trust as RSA. For decades, RSA (Rivest-Shamir-Adleman) … More

elliptic curve

A Gentle Introduction to GPG for Encrypted Message Exchange

Have you ever noticed that some people, especially those in cryptography or tech-savvy circles, include their GPG key in their … More

gpg, pgp

Understanding Security Levels in Fully Homomorphic Encryption

Cryptography is at the heart of protecting sensitive data, and understanding how secure different encryption methods are is essential. In … More

homomorphic

How to Encrypt Float Numbers with Public Key Algorithms in Python

In the ever-evolving landscape of data security, the need to protect sensitive information, including numeric data, is paramount. While public … More

homomorphic, public key

Posts navigation

Older posts


Licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License

You can use any content of this blog just to the extent that you cite or reference

Subscribe to sefiks.com to stay up-to-date with latest posts