Articles about Cryptography - Section 2

Why do cryptography believe? Investigate the theory of computational difficulty behind

Author: Li Haoxuan   Source: Weizhong Bank Blockchain Why choose a cryptographic algorithm for privacy protectio...

Must master: these latest cryptographic advances will shape blockchain trends

Cryptocurrencies cannot exist without cryptography. Advances in cryptography may have a profound impact on blockchain...

How to achieve effective supervision through distributed key technology?

Author: Kao Cheng real This article is the periodic work report of the "Key Steward" research group. I. Asy...

Dry goods | Full homomorphic encryption resource summary

This article was written by Dr. Zhichen Chen. 1.List of Full Homomorphic Encryption Papers 1. http://people.csail.mit...

Technical Dry Goods | How to Learn Full Homomorphic Encryption

This article was written by Dr. Zhichen Chen. Since the WeChat public account posted my blog post "Words for PhD...

Interpretation of the Background of the Cryptography Law: National Crypto War Showdown Begins

Source / LongHash On January 1, 2020, China's first "Cryptography Law of the People's Republic of Chin...

Research | Domestic encryption algorithm combat government affairs alliance chain Can they replace mainstream public chain algorithms?

Source: Consensus Number Letter , the original title "Consensus Number Letter Wang Maolu writes a paper: Researc...

Popular Science | The Cryptography of Bitcoin System and the Impact of Quantum Computing

In 2008, a person under the pseudonym Satoshi Nakamoto published a peerless paper entitled "Bitcoin: A Peer-to-P...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us