Author: Liu towering, Duan Li, Ronin
- Research | Domestic encryption algorithm combat government affairs alliance chain Can they replace mainstream public chain algorithms?
- How to choose the cryptography technology? Preliminary Study on Security Model of Theoretical Capability Boundary
- Why is the promulgation of the cryptography method a tool to promote the blockchain?
- Popular Science | Introduction to Cryptography (Part-1)
- The cryptography of Wanli fifteen years to Xianfeng ten years: Virginia encryption
- Babbitt Column | A Brief History of Blockchain: Where does the blockchain come from and win the Nobel Prize?
Source: Journal of Chuangcun Code (https://mp.weixin.qq.com/s/O_Asu-7Q2f3qI45aXdwpkg)