Welcome to my spot on the web! I'm Philipp, a Software Engineer who loves Cryptography and its potential to change the world as we know it.
On here you'll find various resources and deep dives into topics related to Cryptography, Data Privacy and Data Security.
Feel free to send me a message if you want to get in touch.
Elliptic Curve Pairing
An Elliptic Curve Pairing is a function that maps two Elliptic Curve Points to an element of another group like a finite field.
Shamir's Secret Sharing
Shamir's Secret Sharing allows for a secret to be shared among multiple protocol participants out of which a threshold have to collaborate to reconstruct it.
Ring Signatures allow for a signer to hide a valid signature among a collection of other "mock signatures" that were produced by "co-signers" such that it's impossible to determine who produced the valid signature.
The Chaum-Pedersen Protocol allows a prover to interactively prove to a verifier that they know a secret value without revealing it.
Schnorr Adaptor Signature
A Schnorr Signature can be modified to create an adaptor signature that only verifies when a secret value is applied which itself is revealed upon verification.
Schnorr Signature Aggregation
The Schnorr Signature Protocol can be setup such that the secret key is shared among a group of participants so that all need to collaborate to produce a valid signature.
The Schnorr Signature Protocol allows a prover to non-interactively prove to a verifier that they know a secret value without revealing it.
Schnorr Identification Protocol
The Schnorr Identification Protocol allows a prover to interactively prove to a verifier that they know a secret value without revealing it.
ElGamal Encryption is an asymmetric cryptosystem that allows for the exchange of encrypted messages over an insecure channel.
With Computational Security we analyze how likely it is that a cryptographic construction will be broken in the real world.