Articles about Cryptography - Section 6

Babbitt column | How is full homomorphic encryption solved?

After reading a paper, if you understand it, many people think that the case is a piece of cake, but when I wrote thi...

Ding Wei Li Dawei: The old tree sprouts, can 30 years of cryptography experience bring live water to the blockchain?

“The blockchain is the largest password application for the crypto industry in the next few years.” The...

Anonymity of Past and Present: From Parchment to Blockchain Cryptography

Anonymity: Cryptography technology designed to protect personal privacy 1. Definition Anonymous, as the name suggests...

Babbitt Column | Blockchain: Innovations Based on Cryptography

The Bitcoin system mainly uses public key cryptography, one-way hash function and digital signature three cryptograph...

Science | What is Merkle Pollard?

In the field of cryptographic currency, the Merkel tree is a very efficient method for proving that a particular valu...

Talk about (public key) cryptography entry materials

Author: Liu towering, Duan Li, Ronin Source: Journal of Chuangcun Code (https://mp.weixin.qq.com/s/O_Asu-7Q2f3qI45aXd...

The "Millionaire" problem raised by Yao Zhizhi has been cracked. What kind of ghost is the multi-party safe computing MPC?

In an increasing number of concerns about data privacy, the government began to act to develop a data use compliance ...

Elliptic Curve Cryptography & Workload Proof

Most cryptographic assets use an elliptical curve identical to Bitcoin, called secp256k1. This makes it possible to r...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us