Articles about Cryptography - Section 5

Technical point of view | Changan Wanglou? This is just the tip of the ancient Chinese cryptography application.

01 Introduction Tianbao three years, January 14th, Yongzheng. One hundred and eight squares of Chang'an City are...

Google Privacy Intersection and Technical Analysis 1 – Application Scenario Analysis

In the process of multi-party collaboration, the issue of privacy has been concerned for a long time. How to solve it...

A Preliminary Study of Cryptography: The Art of Hidden Information——The Eleven of the Blockchain Technology

Guide Cryptography is a discipline that encrypts and transmits information and analyzes encrypted information. Accord...

A paper on the history of cryptography, working principle, zero-knowledge proof and potential impact

This article describes the history of cryptography, how it works, proof of zero knowledge, and its potential future i...

Video|"8" Turing Award winner, AIgorand founder Silvio: Solving new problems is more important than solving historical problems

On June 12, 2019, the founder of Algorand, Professor of MIT, Professor of the National Academy of Sciences and Turing...

Internet dividends are exhausted, Facebook is vying for digital credit dividends

Editor's note: Recently, Facebook released the Libra white paper on the encrypted digital currency project, whic...

Yang Guang, Research Director of Conflux: From Modern Cryptography to Blockchain

"It must not be required to be secret, and it must be able to fall into the hands of the enemy without inconveni...

Apple's CryptoKit is related to cryptography, but not to password currency

Apple released a new " CryptoKit " framework at the recent Global Developers Conference (WWDC 2019). Throug...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us