{"generator":"Jekyll","link":[{"@attributes":{"href":"https:\/\/b00f.github.io\/\/feed.xml","rel":"self","type":"application\/atom+xml"}},{"@attributes":{"href":"https:\/\/b00f.github.io\/\/","rel":"alternate","type":"text\/html"}}],"updated":"2025-09-18T05:56:39+00:00","id":"https:\/\/b00f.github.io\/\/feed.xml","title":"b00f","subtitle":"I write, so I am","author":{"name":"Mostafa Sedaghat Joo"},"entry":[{"title":"BLS Threshold Signature using Shamir\u2019s Secret Sharing","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/cryptography\/bls-threshold-shamir-secret-sharing","rel":"alternate","type":"text\/html","title":"BLS Threshold Signature using Shamir\u2019s Secret Sharing"}},"published":"2025-07-11T00:00:00+00:00","updated":"2025-07-11T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/cryptography\/bls-threshold-shamir-secret-sharing","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"cryptography"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Rust Implementation of CGGMP21","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/cryptography\/cggmp21-rust","rel":"alternate","type":"text\/html","title":"Rust Implementation of CGGMP21"}},"published":"2025-06-13T00:00:00+00:00","updated":"2025-06-13T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/cryptography\/cggmp21-rust","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"cryptography"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Define Interfaces Properly","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/others\/define_interfaces_properly","rel":"alternate","type":"text\/html","title":"Define Interfaces Properly"}},"published":"2025-04-23T00:00:00+00:00","updated":"2025-04-23T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/others\/define_interfaces_properly","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"others"}},"summary":{"@attributes":{"type":"html"}}},{"title":"From Devil\u2019s Bridge to Devil\u2019s House","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/others\/devil_bridge","rel":"alternate","type":"text\/html","title":"From Devil\u2019s Bridge to Devil\u2019s House"}},"published":"2024-08-04T00:00:00+00:00","updated":"2024-08-04T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/others\/devil_bridge","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"others"}},"summary":{"@attributes":{"type":"html"}}},{"title":"From Long-range to 51% problems","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/blockchain\/long_range_and_nothing_at_stake_problems","rel":"alternate","type":"text\/html","title":"From Long-range to 51% problems"}},"published":"2023-09-17T00:00:00+00:00","updated":"2023-09-17T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/blockchain\/long_range_and_nothing_at_stake_problems","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"blockchain"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Secure your cloud server","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/linux\/securing_cloud_server","rel":"alternate","type":"text\/html","title":"Secure your cloud server"}},"published":"2023-05-21T00:00:00+00:00","updated":"2023-05-21T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/linux\/securing_cloud_server","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"linux"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Thoughts on Sybil Attacks","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/blockchain\/sybil_attack","rel":"alternate","type":"text\/html","title":"Thoughts on Sybil Attacks"}},"published":"2023-04-14T00:00:00+00:00","updated":"2023-04-14T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/blockchain\/sybil_attack","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"blockchain"}},"summary":{"@attributes":{"type":"html"}}},{"title":"Consensus problem","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/blockchain\/consensus_problem","rel":"alternate","type":"text\/html","title":"Consensus problem"}},"published":"2022-11-10T00:00:00+00:00","updated":"2022-11-10T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/blockchain\/consensus_problem","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"blockchain"}},"summary":{"@attributes":{"type":"html"}}},{"title":"We are not with you","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/literature\/fyodor_dostoevsky_brothers_karamazov","rel":"alternate","type":"text\/html","title":"We are not with you"}},"published":"2022-07-19T00:00:00+00:00","updated":"2022-07-19T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/literature\/fyodor_dostoevsky_brothers_karamazov","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"literature"}},"summary":{"@attributes":{"type":"html"}}},{"title":"What makes a blockchain secure?","link":{"@attributes":{"href":"https:\/\/b00f.github.io\/\/blockchain\/blockchain_security","rel":"alternate","type":"text\/html","title":"What makes a blockchain secure?"}},"published":"2022-03-17T00:00:00+00:00","updated":"2022-03-17T00:00:00+00:00","id":"https:\/\/b00f.github.io\/\/blockchain\/blockchain_security","content":{"@attributes":{"type":"html"}},"author":{"name":"Mostafa Sedaghat Joo"},"category":{"@attributes":{"term":"blockchain"}},"summary":{"@attributes":{"type":"html"}}}]}