Quantum computers have the potential to break certain types of elliptic curve cryptography (ECC) algorithms that are based on the…
Which Cryptocurrency Adopts Which Digital Signature Algorithm
In this post, I’d like to talk to you about the digital signature algorithms used in cryptocurrencies and their importance…
Exploring Euler’s Totient Function’s Role in the Paillier
In the world of cryptography, where the protection of sensitive information is paramount, mathematicians and cryptographers have devised ingenious methods…
Understanding Identity Element in Elliptic Curves
One of the key concepts in elliptic curve theory is the point at infinity, also known as the neutral element…
A Gentle Proof of Why Euler’s Totient Function is Multiplicative
RSA cryptosystem is mainly based on the multiplicative feature of Euler’s totient function. In this blog post, we embark on…
ECDSA vs EdDSA
Elliptic Curve Digital Signature Algorithm or shortly ECDSA and Edwards-curve Digital Signature Algorithm or shortly EdDSA are both public-key digital…
How to Generate Vector Embeddings
Vector models have become ubiquitous in our lives, powering various applications such as facial recognition, reverse image search, recommendation engines…
The Rise of Vector Databases
In the ever-evolving landscape of data management, a powerful new player has emerged: vector databases. With the exponential growth of…
K-NN vs Approximate Nearest Neighbors
In the vast realm of data science and machine learning, the ability to efficiently find similar items or patterns within…
The Rise of Vector Models in Machine Learning
In the rapidly advancing field of machine learning, vector models have emerged as a vital cornerstone for driving breakthroughs in…