Cyphertalk
Welcome to my spot on the web! I'm Philipp, a Software Engineer who loves Cryptography and its potential to change the world as we know it.
On here you'll find various resources and deep dives into topics related to Cryptography, Data Privacy and Data Security.
Feel free to send me a message if you want to get in touch.
Featured
Cryptography Wiki
An actively maintained collection of notes I created throughout my learning journey.
Cryptography Resources
A curated list of resources useful when studying Cryptography and its applications.
Recent Posts
Oblivious Transfer
The Oblivious Transfer Protocol allows a sender to transmit one of various messages to a receiver without the receiver learning which message was sent.
Blind Signature
Blind Signatures allow for a message to be masked such that it can be signed by a third party without it learning what gets signed.
BLS Signature Aggregation
BLS Signatures can be aggregated which results in faster and computationally cheaper verifications of such a batch of signatures.
BLS Signature
BLS Signatures use Elliptic Curve Pairings to create very small, aggregatable digital signatures that can also be used as a building block in Zero-Knowledge Proof constructions.
Elliptic Curve Pairing
An Elliptic Curve Pairing is a function that maps two Elliptic Curve Points to an element of another group like a finite field.
Shamir's Secret Sharing
Shamir's Secret Sharing allows for a secret to be shared among multiple protocol participants out of which a threshold have to collaborate to reconstruct it.
Ring Signature
Ring Signatures allow for a signer to hide a valid signature among a collection of other "mock signatures" that were produced by "co-signers" such that it's impossible to determine who produced the valid signature.
Chaum-Pedersen Protocol
The Chaum-Pedersen Protocol allows a prover to interactively prove to a verifier that they know a secret value without revealing it.
Schnorr Adaptor Signature
A Schnorr Signature can be modified to create an adaptor signature that only verifies when a secret value is applied which itself is revealed upon verification.
Schnorr Signature Aggregation
The Schnorr Signature Protocol can be setup such that the secret key is shared among a group of participants so that all need to collaborate to produce a valid signature.