Articles about Cryptography - Section 6

Dust seal 20 years of cryptography problems, solved by unknown programmers for 3 years

In April 1994, as the celebration of the 35th anniversary of the MIT Computer Science Laboratory, then the laboratory...

Chang Yong: The cryptographic economy from technical trials to social trials

I call on WikiLeaks not to use Bitcoin, because Bitcoin is only a social experiment in the early stages. —...

Introduction to cryptography and practice – Part2

Hash function So far, we are happy that we can protect the content of messages exchanged "by untrusted connectio...

Introduction and practice of cryptography

the term: Plaintext or cleartext : an understandable message that the sender wants to transmit to the recipient. Ciph...

Babbitt column | How is full homomorphic encryption solved?

After reading a paper, if you understand it, many people think that the case is a piece of cake, but when I wrote thi...

Ding Wei Li Dawei: The old tree sprouts, can 30 years of cryptography experience bring live water to the blockchain?

“The blockchain is the largest password application for the crypto industry in the next few years.” The...

Anonymity of Past and Present: From Parchment to Blockchain Cryptography

Anonymity: Cryptography technology designed to protect personal privacy 1. Definition Anonymous, as the name suggests...

Babbitt Column | Blockchain: Innovations Based on Cryptography

The Bitcoin system mainly uses public key cryptography, one-way hash function and digital signature three cryptograph...

Science | What is Merkle Pollard?

In the field of cryptographic currency, the Merkel tree is a very efficient method for proving that a particular valu...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us