EncryptOnchain's profile picture. Sharing the latest insights and breakthroughs on the intersection of privacy-enhancing technologies (PETs) and Web3.

Hosts: @remi_gai @furkanakal

Encrypt Onchain

@EncryptOnchain

Sharing the latest insights and breakthroughs on the intersection of privacy-enhancing technologies (PETs) and Web3. Hosts: @remi_gai @furkanakal

For those who missed it, we just posted the second episode of our TFHE series where @furkanakalcom explains how linear operations are performed on GLWE ciphertexts. (Reference Guide: TFHE-rs Handbook by @zama_fhe) Watch ↓ youtube.com/watch?v=GKstnl…

EncryptOnchain's tweet card. Linear Operations on GLWE Ciphertexts | TFHE #2

youtube.com

YouTube

Linear Operations on GLWE Ciphertexts | TFHE #2


We’re continuing our series on privacy protocols. In this video, @furkanakalcom breaks down what @RAILGUN_Project is and how it powers confidential tokens. Watch ↓


Encrypt Onchain reposted

There are many privacy solutions based on Zether these days. If you're wondering how it simply works and have missed our latest video, take a look! Also turn the notifications from @EncryptOnchain on for the video of the week.

Confidential transfers are essential for mass adoption. In the first video of our new series on confidential transfers, @furkanakalcom breaks down how Zether works. Watch ↓



Confidential transfers are essential for mass adoption. In the first video of our new series on confidential transfers, @furkanakalcom breaks down how Zether works. Watch ↓


How would you decide who is richer from a set of two people in a confidential way? @miguel_de_vega from @nillionnetwork explains Yao's millionaire problem and some ways to solve it. Watch ↓


Have you ever wondered what would a decentralized VPN look like? In our latest video, @furkanakalcom breaks it down in a simple way. Watch ↓


We’re excited to launch a new whiteboard video series where we briefly break down privacy protocols in Web3. In the first episode, @furkanakalcom explores @nillionnetwork — what it is and how it brings privacy to blockchains. Watch ↓


For those who missed it, we just posted the first episode of our TFHE series where @furkanakalcom made an intro and touched on morphology of FHE ciphertexts. (Reference Guide: TFHE-rs Handbook by @zama_fhe) Watch ↓ youtube.com/watch?v=byIOHz…

EncryptOnchain's tweet card. Introduction and Morphology of FHE Ciphertexts | TFHE #1

youtube.com

YouTube

Introduction and Morphology of FHE Ciphertexts | TFHE #1


FHE verifiability is a fairly new and wide open field of research. If you are into math and privacy at the same time, jump in! In this short video @furkanakalcom highlights why verifiability matters in FHE Watch ↓


United States Trends

Loading...

Something went wrong.


Something went wrong.