# Nyan Coin posted March 2014

You liked dogecoin? Well now there is Nyan Coin (yes with the nyancat!)

here it is : http://nyancoin.org/

Hey! I'm **David**, the author of the Real-World Cryptography book. I'm a crypto engineer at O(1) Labs on the Mina cryptocurrency, previously I was the security lead for Diem (formerly Libra) at Novi (Facebook), and a security consultant for the Cryptography Services of NCC Group. This is my blog about **cryptography** and **security** and other related topics that I find interesting.

You liked dogecoin? Well now there is Nyan Coin (yes with the nyancat!)

here it is : http://nyancoin.org/

Well done! You've reached the end of my post. Now you can leave a comment or read something else.

Here are some random **popular** articles:

- - What is the BLS signature scheme?
- - Bits and Bytes ordering in 5 minutes
- - What are x509 certificates? RFC? ASN.1? DER?
- - Fault attacks on RSA's signatures
- - BEAST: An Explanation of the CBC Attack on TLS
- - Common x509 certificate validation/creation pitfalls
- - How did length extension attacks made it into SHA-2?

Here are some random **recent** articles:

- - ZK HACK: 1st puzzle write up
- - Maller optimization to reduce proof size
- - Pairing-based polynomial commitments and Kate polynomial commitments
- - Key wrapping and nonce-misuse resistance
- - How does PLONK work? Part 4: From programs to arithmetic circuits
- - How does PLONK work? Part 3: Starting with the end: polynomials
- - I'm on the develomentor podcast to talk about what applied cryptography is!

My book **Real-World Cryptography** is finished and shipping! You can purchase it here.

If you don't know **where to start**, you might want to check these popular articles:

- - What is the BLS signature scheme?
- - Bits and Bytes ordering in 5 minutes
- - What are x509 certificates? RFC? ASN.1? DER?
- - Fault attacks on RSA's signatures
- - BEAST: An Explanation of the CBC Attack on TLS
- - Common x509 certificate validation/creation pitfalls
- - How did length extension attacks made it into SHA-2?

Here are the latest **links** posted:

- 03 Dec On The Use Of Pedersen Commitments For Confidential Payments
- 02 Dec Fbi Access Levels To Different Messengers
- 01 Dec Why I Have Settled On Xchacha20+Blake3 As The Ae Suite Of Choice For My Projects
- 28 Nov Insecure Random Number Generation
- 27 Nov Bitslicing For Constant Time Cryptography

You can also **suggest a link**.

## Comments

## pumppump

Nyancoin is back. Tellem boi!

## leave a comment...