Blog

Thoughts on security, development, and blockchain.

· 7 min read

Hello Noir! [Part 2]

Using Barretenberg to generate and verify proofs, deploying a Solidity verifier with Foundry, and understanding the trust model.

noir
read →
· 6 min read

Hello Noir! [Part 1]

Setting up the environment and getting an idea what and how will be used.

noir
read →
· 9 min read

Lagrange interpolation: turning points into a polynomial

You have a list of points. Lagrange interpolation gives you the one polynomial that passes through all of them. Here's why ZK proofs care.

math
read →
· 8 min read

The Fiat-Shamir transform: how a hash function replaces a conversation

Schnorr signatures started as a back-and-forth conversation. Fiat-Shamir turned that conversation into a one-liner. Here's how a hash function replaces a trusted stranger.

math
read →
· 12 min read

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

You made it through elliptic curves. Now let's see how they're actually used - signing things, proving identity, and why reusing a nonce will ruin your life.

math
read →
· 10 min read

Private keys and elliptic curves: a deep-dive for people who don't like math

You don't need a math degree to understand elliptic curve cryptography. You just need to understand why spilled rice is more secure than a snake.

math
read →