<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://waamm.github.io/</id><title>ProofVantage</title><subtitle>Notes on the mathematics of cryptography.</subtitle> <updated>2026-05-11T11:04:57+02:00</updated> <author> <name>Wicher Malten</name> <uri>https://waamm.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://waamm.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://waamm.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Wicher Malten </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>ChaCha and Vector Registers</title><link href="https://waamm.github.io/posts/chacha/" rel="alternate" type="text/html" title="ChaCha and Vector Registers" /><published>2026-05-07T00:00:00+02:00</published> <updated>2026-05-11T11:04:21+02:00</updated> <id>https://waamm.github.io/posts/chacha/</id> <content type="text/html" src="https://waamm.github.io/posts/chacha/" /> <author> <name>waamm</name> </author> <category term="Systems Programming" /> <summary>“If you were plowing a field, which would you rather use: two strong oxen or 1024 chickens?” — Seymour Cray A stream cipher generates a long stream of random-looking numbers (called a keystream) and XORs them with data to encrypt or decrypt. ChaCha is a widely used stream cipher that appears in many modern cryptographic systems, including TLS, WireGuard and secure messaging protocols. One...</summary> </entry> <entry><title>DekartProof: Efficient Vector Range Proofs and Their Applications</title><link href="https://waamm.github.io/posts/dekart/" rel="alternate" type="text/html" title="DekartProof: Efficient Vector Range Proofs and Their Applications" /><published>2026-03-04T00:00:00+01:00</published> <updated>2026-04-15T17:38:29+02:00</updated> <id>https://waamm.github.io/posts/dekart/</id> <content type="text/html" src="https://waamm.github.io/posts/dekart/" /> <author> <name>waamm</name> </author> <category term="Cryptography" /> <category term="Zero-Knowledge Proofs" /> <summary>A zero-knowledge range proof allows one party to convince another party that a secret value (or a batch of vaues) lies within a given range — such as being non-negative or below a certain bound — without revealing anything else about the value itself. These proofs are used directly in various applications, including (sometimes auditable) confidential transactions (to verify non-negative transac...</summary> </entry> <entry><title>Generalising Shplonk</title><link href="https://waamm.github.io/posts/shplonked/" rel="alternate" type="text/html" title="Generalising Shplonk" /><published>2026-02-16T00:00:00+01:00</published> <updated>2026-05-07T14:53:16+02:00</updated> <id>https://waamm.github.io/posts/shplonked/</id> <content type="text/html" src="https://waamm.github.io/posts/shplonked/" /> <author> <name>waamm</name> </author> <category term="Cryptography" /> <category term="Polynomial Commitment Schemes" /> <summary>“The raison d’être of KZG commitments is the remarkable efficiency of evaluation-proof verification.” — Justin Thaler [Tha22, p. 233] The KZG1 protocol was the first construction of a polynomial commitment scheme and remains one of the most widely deployed today [KZG10]. Definition (informal). A polynomial commitment scheme (PCS) allows a prover to commit to a polynomial $f$ and later ...</summary> </entry> <entry><title>The Weil Pairing, Part II: Line Bundles on Complex Tori</title><link href="https://waamm.github.io/posts/weil-pairing-part-ii/" rel="alternate" type="text/html" title="The Weil Pairing, Part II: Line Bundles on Complex Tori" /><published>2026-01-15T00:00:00+01:00</published> <updated>2026-04-15T17:38:29+02:00</updated> <id>https://waamm.github.io/posts/weil-pairing-part-ii/</id> <content type="text/html" src="https://waamm.github.io/posts/weil-pairing-part-ii/" /> <author> <name>waamm</name> </author> <category term="Pure Mathematics" /> <category term="Elliptic Curves" /> <summary>“My mathematics work is proceeding beyond my wildest hopes, and I am even a bit worried — if it’s only in prison that I work so well, will I have to arrange to spend two or three months locked up every year?” — André Weil, letter to his wife Eveline from the Rouen prison, 7 April 1940 (around the time he discovered the Weil pairing and proved the Riemann hypothesis for curves over finite fie...</summary> </entry> <entry><title>The Weil Pairing, Part I: Function Theory on Complex Tori</title><link href="https://waamm.github.io/posts/weil-pairing-part-i/" rel="alternate" type="text/html" title="The Weil Pairing, Part I: Function Theory on Complex Tori" /><published>2025-12-18T00:00:00+01:00</published> <updated>2026-04-15T17:38:29+02:00</updated> <id>https://waamm.github.io/posts/weil-pairing-part-i/</id> <content type="text/html" src="https://waamm.github.io/posts/weil-pairing-part-i/" /> <author> <name>waamm</name> </author> <category term="Pure Mathematics" /> <category term="Elliptic Curves" /> <summary>“The Weil pairing, first introduced by André Weil in 1940, plays an important role in the theoretical study of the arithmetic of elliptic curves and Abelian varieties. It has also recently become extremely useful in cryptologic constructions related to those objects.” — Victor S. Miller in his seminal 2004 paper1 [Mil04] This quote foreshadowed the emergence of what is today a fully fledge...</summary> </entry> </feed>
