Elliptic curve cryptography or shortly ECC has several advantages over traditional public key cryptography algorithms such as RSA, ElGamal, and…
A Step by Step Partially Homomorphic Encryption Example with Benaloh in Python From Scratch
In an age where data privacy and security are paramount, encryption plays a pivotal role in safeguarding sensitive information. One…
Elliptic Curve Cryptography in Post Quantum Age
Quantum computers have the potential to break certain types of elliptic curve cryptography (ECC) algorithms that are based on the…
Which Cryptocurrency Adopts Which Digital Signature Algorithm
In this post, I’d like to talk to you about the digital signature algorithms used in cryptocurrencies and their importance…
Exploring Euler’s Totient Function’s Role in the Paillier
In the world of cryptography, where the protection of sensitive information is paramount, mathematicians and cryptographers have devised ingenious methods…
Understanding Identity Element in Elliptic Curves
One of the key concepts in elliptic curve theory is the point at infinity, also known as the neutral element…
A Gentle Proof of Why Euler’s Totient Function is Multiplicative
RSA cryptosystem is mainly based on the multiplicative feature of Euler’s totient function. In this blog post, we embark on…
ECDSA vs EdDSA
Elliptic Curve Digital Signature Algorithm or shortly ECDSA and Edwards-curve Digital Signature Algorithm or shortly EdDSA are both public-key digital…
How to Generate Vector Embeddings
Vector models have become ubiquitous in our lives, powering various applications such as facial recognition, reverse image search, recommendation engines…
The Rise of Vector Databases
In the ever-evolving landscape of data management, a powerful new player has emerged: vector databases. With the exponential growth of…