y0news
AnalyticsDigestsSourcesTopicsRSSAICrypto

#cryptography News & Analysis

85 articles tagged with #cryptography. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.

85 articles
CryptoNeutralBitcoin Magazine · Feb 266/107
⛓️

The Core Issue: libsecp256k1, Bitcoin’s Cryptographic Heart

The article explores libsecp256k1, a cryptographic library that began as a small hobby project but evolved into one of Bitcoin's most critical security components. This library now protects a multi-trillion dollar asset and represents a crucial piece of Bitcoin's cryptographic infrastructure.

$BTC
CryptoBullishEthereum Foundation Blog · Dec 186/102
⛓️

Shipping an L1 zkEVM #2: The Security Foundations

The article discusses the development of an L1 zkEVM focusing on security foundations, with contributions from Ethereum Foundation's cryptography team. The zkEVM ecosystem has achieved significant progress over the past year, reaching real-time operational capabilities.

CryptoNeutralVitalik Buterin Blog · Jun 286/104
⛓️

Does digital ID have risks even if it's ZK-wrapped?

The article explores potential risks associated with digital identity systems even when protected by zero-knowledge (ZK) cryptographic technology. It examines whether ZK wrapping provides sufficient privacy and security guarantees for digital ID implementations.

CryptoBullishEthereum Foundation Blog · Jan 176/102
⛓️

Announcing the 2024 Academic Grants Round Recipients

The Ethereum Ecosystem Funding Initiative announced recipients of their 2024 Academic Grants Round, supporting 41 projects from researchers and institutions worldwide. The funded projects focus on fundamental challenges in cryptography, consensus mechanisms, security, and execution to support Ethereum's growth and development.

Announcing the 2024 Academic Grants Round Recipients
$ETH
CryptoNeutralVitalik Buterin Blog · Jul 235/102
⛓️

Exploring circle STARKs

The article explores circle STARKs, a cryptographic proof system that represents an advancement in zero-knowledge technology. This technical development could enhance scalability and privacy solutions in blockchain applications.

AIBullishHugging Face Blog · Apr 166/104
🧠

Running Privacy-Preserving Inferences on Hugging Face Endpoints

The article discusses methods for running privacy-preserving machine learning inferences on Hugging Face endpoints. This technology allows users to perform AI model computations while protecting sensitive input data from being exposed to the service provider.

CryptoNeutralEthereum Foundation Blog · Aug 25/103
⛓️

KZG Ceremony Special Contributions

The KZG Ceremony held a Special Contribution Period from April 1-16, 2023, allowing participants to contribute in ways not possible during the Open Contribution period. While only one honest participant is needed for ceremony security, these special contributions provide additional assurances for the cryptographic setup.

KZG Ceremony Special Contributions
AI × CryptoBullishHugging Face Blog · Nov 176/107
🤖

Sentiment Analysis on Encrypted Data with Homomorphic Encryption

The article discusses techniques for performing sentiment analysis on encrypted data using homomorphic encryption. This approach allows analysis of sensitive data while maintaining privacy, potentially enabling new applications in finance and other sectors requiring data confidentiality.

CryptoNeutralEthereum Foundation Blog · Jan 166/102
⛓️

Announcing the KZG Ceremony

The article announces the KZG Ceremony, a cryptographic setup process related to Ethereum's scaling roadmap. It uses metaphorical language to describe current network congestion issues and hints at future improvements through sharding technology.

Announcing the KZG Ceremony
CryptoBullishEthereum Foundation Blog · Dec 26/103
⛓️

Verkle tree structure

Verkle trees are a new commitment scheme that improves upon Merkle trees by using vector commitments instead of hashes, enabling much smaller witnesses and more efficient wider branching factors. This cryptographic advancement represents a significant technical improvement for blockchain data structures.

Verkle tree structure
CryptoBullishVitalik Buterin Blog · Nov 56/104
⛓️

Halo and more: exploring incremental verification and SNARKs without pairings

The article explores Halo and other incremental verification systems that utilize SNARKs (Succinct Non-Interactive Arguments of Knowledge) without requiring pairing-based cryptography. This represents a significant advancement in zero-knowledge proof technology, potentially offering improved efficiency and broader applicability for blockchain scaling solutions.

CryptoBullishEthereum Foundation Blog · Nov 86/102
⛓️

eth2 quick update no. 3

Ethereum 2.0 development continues with security improvements to fork choice mechanisms following audit recommendations. New initiatives include the launch of challenges.ethereum.org and a grant to Herumi for developing high-performance BLS cryptographic implementations.

eth2 quick update no. 3
$ETH
CryptoNeutralVitalik Buterin Blog · Feb 15/102
⛓️

[Mirror] Zk-SNARKs: Under the Hood

The article appears to be a technical deep-dive into zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge), a cryptographic proof system that enables privacy-preserving verification. However, the article body content was not provided, limiting the ability to extract specific technical details or market implications.

CryptoNeutralEthereum Foundation Blog · Feb 146/104
⛓️

The Subjectivity / Exploitability Tradeoff

The article discusses the fundamental tradeoff between subjectivity and exploitability in consensus mechanisms. While consensus systems can be designed to resist attackers up to a certain threshold, they remain vulnerable to exploitation when attackers control sufficient resources, highlighting inherent security limitations in proof-of-work and other consensus architectures.

CryptoBullishEthereum Foundation Blog · Aug 165/104
⛓️

Secret Sharing and Erasure Coding: A Guide for the Aspiring Dropbox Decentralizer

The article explores decentralized file storage systems as an alternative to centralized cloud storage, focusing on technical concepts like secret sharing and erasure coding. It discusses how these cryptographic techniques enable distributed storage networks to provide secure, redundant file storage without relying on single providers.

CryptoNeutralEthereum Foundation Blog · May 275/102
⛓️

What If Ethereum Lived on a Treap? Or, Blockchains Charging Rent

The article explores blockchain scalability challenges, noting that fundamental solutions requiring every node to process every transaction remain difficult. It discusses how current proposed solutions rely on advanced cryptography or complex multi-blockchain architectures, while partial solutions offer only constant-factor improvements.

$ETH
CryptoBullishEthereum Foundation Blog · Feb 174/102
⛓️

Ethereum Protocol Studies 2026

Ethereum Protocol Studies returns for 2026 with expanded content tracks covering cryptography, lean consensus, and zkEVM, launching February 23rd. The program now includes a new self-paced learning platform accessible at epf.wiki.

Ethereum Protocol Studies 2026
$ETH
CryptoNeutralVitalik Buterin Blog · Jun 184/102
⛓️

Verkle trees

The article title indicates a focus on Verkle trees, which are cryptographic data structures designed to improve blockchain efficiency and scalability. However, the article body appears to be empty, preventing detailed analysis of the specific implementation or implications discussed.

CryptoNeutralVitalik Buterin Blog · Jan 264/102
⛓️

An approximate introduction to how zk-SNARKs are possible

The article appears to be an introductory technical explanation of zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk-SNARKs), a cryptographic technology that enables privacy-preserving verification of computations. However, the article body is empty in the provided content, making detailed analysis impossible.

CryptoNeutralEthereum Foundation Blog · May 214/102
⛓️

Validated, staking on eth2: #4 - Keys 🔑

This article explores the signature scheme fundamentals underlying Ethereum 2.0's Proof of Stake system. It explains how cryptographic signatures enable validator identity verification and accountability for their network actions.

Validated, staking on eth2: #4 - Keys 🔑
CryptoNeutralVitalik Buterin Blog · Oct 14/101
⛓️

In-person meatspace protocol to prove unconditional possession of a private key

The article presents an in-person protocol designed to cryptographically prove unconditional possession of a private key through physical interaction. This addresses the challenge of verifying true control over cryptocurrency or digital assets without revealing the actual private key.

CryptoNeutralVitalik Buterin Blog · Jul 214/101
⛓️

STARKs, Part 3: Into the Weeds

This appears to be Part 3 of a technical series explaining STARKs (Scalable Transparent Arguments of Knowledge), a cryptographic proof system used in blockchain scaling solutions. Without the article body content, this likely continues the deep technical exploration of STARK implementation details and mathematical foundations.

CryptoNeutralVitalik Buterin Blog · Nov 224/101
⛓️

STARKs, Part II: Thank Goodness It's FRI-day

This appears to be the second part of a technical article series about STARKs (Scalable Transparent Arguments of Knowledge) technology, likely focusing on FRI (Fast Reed-Solomon Interactive Oracle Proofs). However, the article body content was not provided for analysis.

← PrevPage 3 of 4Next →