# Cyphertalk

Welcome to my spot on the web! I'm Philipp, a Software Engineer who loves Cryptography and its potential to change the world as we know it.

On here you'll find various resources and deep dives into topics related to Cryptography, Data Privacy and Data Security.

Feel free to send me a message if you want to get in touch.

## Featured

### Cryptography Wiki

An actively maintained collection of notes I created throughout my learning journey.

### Cryptography Resources

A curated list of resources useful when studying Cryptography and its applications.

## Recent Posts

### Elliptic Curve Pairing

An Elliptic Curve Pairing is a function that maps two Elliptic Curve Points to an element of another group like a finite field.

### Shamir's Secret Sharing

Shamir's Secret Sharing allows for a secret to be shared among multiple protocol participants out of which a threshold have to collaborate to reconstruct it.

### Ring Signature

Ring Signatures allow for a signer to hide a valid signature among a collection of other "mock signatures" that were produced by "co-signers" such that it's impossible to determine who produced the valid signature.

### Chaum-Pedersen Protocol

The Chaum-Pedersen Protocol allows a prover to interactively prove to a verifier that they know a secret value without revealing it.

### Schnorr Adaptor Signature

A Schnorr Signature can be modified to create an adaptor signature that only verifies when a secret value is applied which itself is revealed upon verification.

### Schnorr Signature Aggregation

The Schnorr Signature Protocol can be setup such that the secret key is shared among a group of participants so that all need to collaborate to produce a valid signature.

### Schnorr Signature

The Schnorr Signature Protocol allows a prover to non-interactively prove to a verifier that they know a secret value without revealing it.

### Schnorr Identification Protocol

The Schnorr Identification Protocol allows a prover to interactively prove to a verifier that they know a secret value without revealing it.

### ElGamal Encryption

ElGamal Encryption is an asymmetric cryptosystem that allows for the exchange of encrypted messages over an insecure channel.

### Computational Security

With Computational Security we analyze how likely it is that a cryptographic construction will be broken in the real world.