Skip to content

  • Twitter

  • Youtube

  • GitHub

  • Linkedin

  • Facebook

  • Instagram

  • RSS

  • Mail

Sefik Ilkin Serengil

Code wins arguments

  • Home
  • About Me
  • Publications
  • Courses
  • Talks
  • Consultancy

A Step by Step Partially Homomorphic Encryption Example with Naccache-Stern In Python

In the ever-evolving landscape of cybersecurity, encryption plays a pivotal role in safeguarding sensitive information. One intriguing facet of encryption…

homomorphic

A Step by Step Partially Homomorphic Encryption Example with Damgard-Jurik in Python

In the world of data security and privacy, encryption plays a pivotal role in safeguarding sensitive information from prying eyes.…

homomorphic

A Step by Step Partially Homomorphic Encryption Example with Okamoto–Uchiyama in Python

In today’s rapidly evolving digital landscape, the need for secure data transmission and storage has never been more critical. To…

homomorphic

Use Cases of Elliptic Curve Cryptography

Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the mathematics of elliptic curves to…

elliptic curve

Elliptic Curve Cryptography vs The Other Public Key Algorithms

Elliptic curve cryptography or shortly ECC has several advantages over traditional public key cryptography algorithms such as RSA, ElGamal, and…

elliptic curve

A Step by Step Partially Homomorphic Encryption Example with Benaloh in Python From Scratch

In an age where data privacy and security are paramount, encryption plays a pivotal role in safeguarding sensitive information. One…

homomorphic

Elliptic Curve Cryptography in Post Quantum Age

Quantum computers have the potential to break certain types of elliptic curve cryptography (ECC) algorithms that are based on the…

elliptic curve

Which Cryptocurrency Adopts Which Digital Signature Algorithm

In this post, I’d like to talk to you about the digital signature algorithms used in cryptocurrencies and their importance…

blockchain, cryptocurrency, elliptic curve

Exploring Euler’s Totient Function’s Role in the Paillier

In the world of cryptography, where the protection of sensitive information is paramount, mathematicians and cryptographers have devised ingenious methods…

euler, paillier, totient

Understanding Identity Element in Elliptic Curves

One of the key concepts in elliptic curve theory is the point at infinity, also known as the neutral element…

elliptic curve, identity element, neutral element, point at infinity

Posts navigation

Older posts
Newer posts


Licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License

You can use any content of this blog just to the extent that you cite or reference

Subscribe to sefiks.com to stay up-to-date with latest posts

🎭 DeepFace is THE BEST facial recognition library for Python 🐍 It wraps many cutting-edge models that reaches and passes human-level accuracy 💪


BTW, Haven't you subscribe to my YouTube channel yet?