Encrypt Onchain
@EncryptOnchain
Sharing the latest insights and breakthroughs on the intersection of privacy-enhancing technologies (PETs) and Web3. Hosts: @remi_gai @furkanakal
For those who missed it, we just posted the second episode of our TFHE series where @furkanakalcom explains how linear operations are performed on GLWE ciphertexts. (Reference Guide: TFHE-rs Handbook by @zama_fhe) Watch ↓ youtube.com/watch?v=GKstnl…
youtube.com
YouTube
Linear Operations on GLWE Ciphertexts | TFHE #2
We’re continuing our series on privacy protocols. In this video, @furkanakalcom breaks down what @RAILGUN_Project is and how it powers confidential tokens. Watch ↓
There are many privacy solutions based on Zether these days. If you're wondering how it simply works and have missed our latest video, take a look! Also turn the notifications from @EncryptOnchain on for the video of the week.
Confidential transfers are essential for mass adoption. In the first video of our new series on confidential transfers, @furkanakalcom breaks down how Zether works. Watch ↓
Confidential transfers are essential for mass adoption. In the first video of our new series on confidential transfers, @furkanakalcom breaks down how Zether works. Watch ↓
How would you decide who is richer from a set of two people in a confidential way? @miguel_de_vega from @nillionnetwork explains Yao's millionaire problem and some ways to solve it. Watch ↓
Have you ever wondered what would a decentralized VPN look like? In our latest video, @furkanakalcom breaks it down in a simple way. Watch ↓
If you missed our podcast episode with @davidlsneider from @litprotocol, we just posted it on YouTube! Watch ↓ youtube.com/watch?v=USL851…
youtube.com
YouTube
Decentralized Key Management w/ David Sneider, Lit Protocol
We’re excited to launch a new whiteboard video series where we briefly break down privacy protocols in Web3. In the first episode, @furkanakalcom explores @nillionnetwork — what it is and how it brings privacy to blockchains. Watch ↓
For those who missed it, we just posted the first episode of our TFHE series where @furkanakalcom made an intro and touched on morphology of FHE ciphertexts. (Reference Guide: TFHE-rs Handbook by @zama_fhe) Watch ↓ youtube.com/watch?v=byIOHz…
youtube.com
YouTube
Introduction and Morphology of FHE Ciphertexts | TFHE #1
FHE verifiability is a fairly new and wide open field of research. If you are into math and privacy at the same time, jump in! In this short video @furkanakalcom highlights why verifiability matters in FHE Watch ↓
United States Trends
- 1. Happy Thanksgiving Eve 2,409 posts
- 2. Good Wednesday 23.9K posts
- 3. Colorado State 2,839 posts
- 4. Luka 66.7K posts
- 5. #wednesdaymotivation 3,787 posts
- 6. Lakers 52.3K posts
- 7. Nuns 6,550 posts
- 8. Jim Mora 1,192 posts
- 9. Clippers 19.3K posts
- 10. Kris Dunn 3,021 posts
- 11. Collar 46.4K posts
- 12. Karoline Leavitt 24.7K posts
- 13. The God 386K posts
- 14. Witkoff 169K posts
- 15. Kawhi 6,665 posts
- 16. Jaxson Hayes 2,711 posts
- 17. Bayern 83.9K posts
- 18. Reaves 14.2K posts
- 19. Check Analyze 3,333 posts
- 20. #LakeShow 3,640 posts
Something went wrong.
Something went wrong.