News

To get slightly more technical and introduce some of the more common terms used in the Cryptoworld, the mining process is where Bitcoin mining hardware runs a cryptographic hashing function on a ...
General-purpose cryptographic hash functions like MD5 and SHA-1 are now considered insecure for password storage because they're designed for speed rather than security. Modern password hashing should ...
Abstract: In this paper, we classify zk-friendly hash functions into three categories based on their inner structure. We explain the structures, name existing use cases, and analyze their performance.
I originally created this as a short to-do list of study topics for becoming a software engineer, but it grew to the large list you see today. After going through this study plan, I got hired as a ...
This repository contains my implementations of classical cryptographic algorithms written in C++. The focus was to deepen my understanding of low-level cryptographic logic by implementing each ...