Articles about Cryptography - Section 5
A paper on the history of cryptography, working principle, zero-knowledge proof and potential impact
This article describes the history of cryptography, how it works, proof of zero knowledge, and its potential future i...
Video|"8" Turing Award winner, AIgorand founder Silvio: Solving new problems is more important than solving historical problems
On June 12, 2019, the founder of Algorand, Professor of MIT, Professor of the National Academy of Sciences and Turing...
Internet dividends are exhausted, Facebook is vying for digital credit dividends
Editor's note: Recently, Facebook released the Libra white paper on the encrypted digital currency project, whic...
China Net An Anhongzhang: Because of the blockchain, the era of password definition business is coming | Interview with Babbitt
In 2012, due to the temporary work arrangement of the unit , An Hongzhang first came into contact with the digital cu...
Yang Guang, Research Director of Conflux: From Modern Cryptography to Blockchain
"It must not be required to be secret, and it must be able to fall into the hands of the enemy without inconveni...
Apple's CryptoKit is related to cryptography, but not to password currency
Apple released a new " CryptoKit " framework at the recent Global Developers Conference (WWDC 2019). Throug...
Dust seal 20 years of cryptography problems, solved by unknown programmers for 3 years
In April 1994, as the celebration of the 35th anniversary of the MIT Computer Science Laboratory, then the laboratory...
Chang Yong: The cryptographic economy from technical trials to social trials
I call on WikiLeaks not to use Bitcoin, because Bitcoin is only a social experiment in the early stages. —...
Introduction to cryptography and practice – Part2
Hash function So far, we are happy that we can protect the content of messages exchanged "by untrusted connectio...
Introduction and practice of cryptography
the term: Plaintext or cleartext : an understandable message that the sender wants to transmit to the recipient. Ciph...

- You may be interested
- Summary of the 9 key points of Ethcc co...
- Technical direction: Bandwidth optimiza...
- Where is the blockchain enterprise sett...
- DeFiance Capital CEO The gap between le...
- Currency security "monitoring self...
- Introduction: Different types and simil...
- The price has plummeted and the computi...
- Canadian Securities Authority incorpora...
- How long will the V-God disappoint with...
- Understanding DeFi Protocols Without Or...
- Babbitt Exclusive | The central bank&ap...
- The “blockchain scam”, wh...
- Global central bank digital currencies ...
- Is the privacy feature useful? A quick...
- Babbitt Depth | Above 5G, cloud games w...
Find your business way
Globalization of Business, We can all achieve our own Success.