Cyphertalk
Welcome to my spot on the web! I'm Philipp, a Software Engineer who loves Cryptography and its potential to change the world as we know it.
On here you'll find various resources and deep dives into topics related to Cryptography, Data Privacy and Data Security.
Feel free to send me a message if you want to get in touch.
Featured
Cryptography Wiki
An actively maintained collection of notes I created throughout my learning journey.
Cryptolab Repository
From scratch implementations of Cryptographic primitives and protocols.
Cryptography Resources
A curated list of resources useful when studying Cryptography and its applications.
Recent Posts
Two-Party ECDSA
2P-ECDSA is a protocol that allows two parties to jointly create digital signatures over messages via a shared private key that neither party has full access to or control over.
Elliptic Curve Digital Signature Algorithm
ECDSA is used to create digital signatures over messages which can be non-interactively verified.
Pedersen Commitment Scheme
A Commitment Scheme is a mechanism to ensure that a value that was committed to can't be changed after the fact.
Hash-Based Commitment Scheme
A Commitment Scheme is used when one wants to guarantee that a value that was chosen can't be changed afterwards.
Oblivious Transfer
The Oblivious Transfer Protocol allows a sender to transmit one of various messages to a receiver without the receiver learning which message was sent.
Blind Signature
Blind Signatures allow for a message to be masked such that it can be signed by a third party without it learning what gets signed.
BLS Signature Aggregation
BLS Signatures can be aggregated which results in faster and computationally cheaper verifications of such a batch of signatures.
BLS Signature
BLS Signatures use Elliptic Curve Pairings to create very small, aggregatable digital signatures that can also be used as a building block in Zero-Knowledge Proof constructions.
Elliptic Curve Pairing
An Elliptic Curve Pairing is a function that maps two Elliptic Curve Points to an element of another group like a finite field.
Shamir's Secret Sharing
Shamir's Secret Sharing allows for a secret to be shared among multiple protocol participants out of which a threshold have to collaborate to reconstruct it.