Cyphertalk
👋 Welcome to my spot on the web.
I'm Philipp, a Software Engineer who loves Cryptography as it's one of the few technologies that empowers individuals in a permissionless manner.
On my website you'll find various resources and deep dives into topics related to Cryptography, Data Privacy and Data Security.
Feel free to send me a message if you want to get in touch.
Featured
Cryptography Wiki
An actively maintained collection of notes I created throughout my learning journey.
Cryptolab Repository
From scratch implementations of Cryptographic primitives and protocols.
Cryptography Resources
A curated list of resources useful when studying Cryptography and its applications.
Recent Posts
Proxy Re-Encryption
Proxy Re-Encryption allows an untrusted third party to modify a ciphertext that was encrypted under key A to be decryptable with a different key B without learning anything about the plaintext or the private keys involved.
Stealth Address
A Stealth Address is an address that can be derived by any third party but only controlled by the owner of the linked private key.
Adaptor Signature
An Adaptor Signature allows for the creation of a partial signature that can be turned into a full signature by applying a secret value which itself is revealed once the full signature is publicly shared.
Lagrange Interpolation
Lagrange Interpolation is used to reconstruct any degree n polynomial using at least n + 1 of its evaluations.
ECDSA Adaptor Signature
An ECDSA Signature can be modified to create an adaptor signature that's only valid when a secret value is incorporated which itself is revealed when the adapted signature is publicly shared.
Two-Party ECDSA
2P-ECDSA is a protocol that allows two parties to jointly create digital signatures over messages via a shared private key that neither party has full access to or control over.
Elliptic Curve Digital Signature Algorithm
ECDSA is used to create digital signatures over messages which can be non-interactively verified.
Pedersen Commitment Scheme
A Commitment Scheme is a mechanism to ensure that a value that was committed to can't be changed after the fact.
Hash-Based Commitment Scheme
A Commitment Scheme is used when one wants to guarantee that a value that was chosen can't be changed afterwards.
Oblivious Transfer
The Oblivious Transfer Protocol allows a sender to transmit one of various messages to a receiver without the receiver learning which message was sent.