lonerapier.xyz
Search
Search
Dark mode
Light mode
Explorer
posts
Drafts
Beauty of Survival
Computer Architecture
Great Work
Music
Performance Engineering
cryptography
Inspiration
Meaning
Note to Self
Practice
Reading List: Books
Why I Procastinate?
thoughts
blockchain
Communication Across Distributed Ledgers
Key Derivation
Making Sense of Rollups
Sovereign Rollups
Uncovering Celestia
cryptography
AES encryption
Asymmetric cryptography
Authenticated Encryption
Bilinear Pairings
Binius
block-ciphers
CCS: Customisable Constraint Systems
Chapter 03: Definitions and Technical Preliminaries
Concepts that I should remember everytime
Cryptography Reading List
DES encryption
Diffie-Hellman
El-Gamal Public Key Encryption
Elliptic Curve Cryptography
elliptic-curve-arithmetic
Fiat-Shamir Heuristic
Finite Fields
Forking Lemma
FRI PCS
Garbled Circuit
Halo2
Hash functions
Homomorphic Encryption
Identity Based Encryption
Integer Factorisation
Interactive Oracle Proofs
Interactive Proofs
Interactive Proofs
Intro to Mathematical Cryptography
Key Derivation
KS23: Hypernova
Kyber Key Encapsulation Mechanism
Land of Sumcheck
Lattice Based Cryptography
Lattice Cryptanalysis
Learning With Errors
Message authentication
Modular Arithmetic
MSM - Multi scalar multiplication
Multi-Party Computation
Notes: logUp-lookup
Oblivious RAM
Oblivious Transfer
One-Way Functions
PAZK Chapter 02: The Power Of Randomness
PCD & IVC
Pedersen Commitments
Pedersen Hash
PLONK
Polynomial Commitments
Post Quantum Cryptography
Proof Nullifier
Proof Systems Study
Proofs, Arguments and Zero Knowledge
Pseudorandom generator, function and permutation
Public Key Encryption
Quantum Cryptography
Random Oracle Model
Rank-1 Constraint System
Reed Solomon Erasure Codes
Schnorr protocol
Secret Sharing
Secure Computation
Secure Function Evalaution
seminal-papers
Sigma Protocol
Signatures
SNARKs
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
STARK
Stream Ciphers
Symmetric Cryptography
Theory of Elliptic Curves
Trusted setup
Understanding Lookup arguments in SNARKs
distributed-systems
DAG-based consensus
partial-synchrony
Tendermint
Abundant Energy
Chinese Remainder Theorem
Complexity Theory
Computational Complexity
Computational Theory
Concurrency
Cool Things
Divisors
Fourier Transform
Group Theory
Health Experiments
HTTP
Isogeny
Leftover Hash Lemma
Meditation
MMU
Morphism in Abstract Algebra
Multithreading
Network Protocols
New World Order
number-theory
Prompt Engineering
Quantum Algorithms
Quantum Computing
Rabbit Holes
Rational Functions
Reintroduction
Richard P. Feynman
ring-theory
Rust notes
Schwartz-Zippel Lemma
Signed Data
Signed Exchanges
Software Philosophy
TEE
The Book Of Five Rings
The Creative Act by Rick Rubin
The incomplete guide to art of discovery by Jack E. Oliver
TLS
TLS Oracles
Undecidability
Utilitarianism
VPN
WASM
Writing a Btree in Rust
Zeroes And Poles
Technical links on Internet that I don't want to forget
Things on Internet that I don't want to forget
Home
❯
posts
❯
Drafts
❯
Computer Architecture
Computer Architecture
Aug 01, 2024
1 min read
technical
drafts
Syllabus
Struggle
Questions
Resources
Syllabus
Graph View
Backlinks
Drafts