« Back

Hacker Dōjō|Project Research—Elliptic Curve Cryptography and Public Key Encryption

15 days left



200 USDT


  • Research
  • Elliptic curve groups
  • Diffie-Hellman key exchange
  • ElGamal encryption
  • Homomorphic encryption

This bounty requires pre-communication before the task. Please contact Hacker Dojo @DoraDojo0 via Telegram to make sure you're eligible for the bounty. Continue reading to learn the sign-up process.

Bounty type: Topic study and interpretation

Language requirements: English

Applicant requirements: From an academic background of computer science/cryptography or other relevant majors.

How to finish the bounty task:

  1. Read the provided references to understand the key concepts and fundamentals. You're welcome to read more references that are not listed here.
  2. Do live workshop and interpret the following contents: a. The fundamentals of Elliptic curve cryptography(ECC) b. The comparison among ECC and other cryptography algorithms, including Diffie-Hellman algorithm, RSA algorithm(Ron Rivest,Adi Shamir and Leonard Adleman), ElGamal encryption, Homomorphic encryption, etc.
  3. Provide your manuscript after the live lecture. The deliverable should be text/picture/link.

References/Reading Materials:

  1. https://link.springer.com/book/10.1007/978-1-4615-3198-2
  2. https://www.youtube.com/watch?v=_CwIWk6XDmg

You are welcome to search for relevant data/studies on your own apart from the provided reading materials; If other studies were referenced in the research results, please indicate the source.


  1. Please click Participate on the left side on this page for registration ;
  2. Before starting the task, bounty hunters(applicants) will be asked to enter a simple screening via Telegram. Please contact @DoraDojo0 via Telegram before your study.
  3. The hunter approved will be granted the right to claim Bounty by starting the study;
  4. When the progress of the task is confirmed to be ready for the live workshop, Dōjo team will schedule a live sharing session for you to showcase your research results;
  5. Bounty in crpto will be issued after completing the live session and manuscript. Please claim the rewards on this page. (Hunter Rewards Claiming Guide: https://dorahacks.io/blog/guides/bounty-hunter/)

What is Dora Dōjo?

Dora Dōjo is an open source community for Frontier Web3 knowledge contributors and learners built by hackers. Dōjo organizes regular open-source knowledge sessions via Livestream/Twitter Space/blog posts, the topics including interpretation of Web3 cutting-edge technology papers, workshops, seminars with crypto tech leaders and so on. Welcome to discuss and learn in the Dora Dōjo community: https://community.dorahacks.io/c/buidl-dorahacks-io/6

The topics currently shared by Dora Dōjo including:

  • Narwhal Mempool Protocol and Tusk Consensus Protocol
  • Bullshark Consensus Protocol
  • Modular chain
  • Cryptography (symmetric encryption algorithms, hash functions, group and public key encryption, digital signatures and KZG commitments, zero-knowledge proofs)
  • Move Prover
  • Aptos Consensus

By joining Dōjo, hackers can suggest personal learning expectations, or take the initiative to propose topics that they are skilled at and have Dōjo team organize sharing sessions. At the same time, the Dora Dōjo Web3 Research Program offers subjects regularly for hackers to study and share their insights. Contributors will be rewarded in the form of a bounty.


Telegram: @DoraDojo0

WeChat: @HackerDojo0

E-mail: hackerdojo0@gmail.com

  • Hacker Dōjo0 created the bounty on 2023/01/07 19:00:10

  • navinlira participated on 2023/01/10 16:15:04

  • Ken2889 participated on 2023/01/14 23:51:56

  • Bujang22 participated on 2023/01/18 20:27:02

  • dekroy999 participated on 2023/01/22 23:46:08

  • EiraNgo participated on 2023/02/02 17:31:24

  • melnaquib participated on 2023/03/05 22:23:36

  • UsernameDJZS participated on 2023/03/06 08:32:36

  • 0xShikhar participated on 2023/03/07 00:21:06

  • samar19 participated on 2023/03/08 02:58:56