Articles about Isolation Witness - Section 66
Mining from entry to proficiency (eight) mining industry ecology – peripheral services
Mining from entry to mastery (eight) Getting Started – Basics of Mining Miner mining is the process of producin...
Hard core! 360 senior security expert Peng Brewing takes Zcash as an example to talk about the security and privacy issues of zero-knowledge proof
On October 12th, the "2019 CCF Blockchain Technology Conference" hosted by the Chinese Computer Society (CC...
Mind Reading: Extracting "Knowledge" from Zero Knowledge Proof
And what, Socrates, is the food of the soul? Surely, I said, knowledge is the food of the soul. Socrates, what is the...
Academician Zhou Zhongyi of the Chinese Academy of Engineering: Blockchain application must first distinguish user-centric classification
On October 12th, the 2019CCF Blockchain Technology Conference – Blockchain Technology Topic Report was held in ...
Chen Chun, an academician of the Chinese Academy of Engineering: Data collaboration technology under the chain is an important direction for the development of the alliance chain
On October 12th, the "2019 CCF Blockchain Technology Conference" hosted by the Chinese Computer Society (CC...
Facebook is again "retired"! The Libra Association’s six payment industry members now have only one
According to The block, payment giants Mastercard, Visa, eBay, Stripe and Mercado Pago also announced their withdrawa...
In the second half of the Internet, can the blockchain solve the economic difficulties of the platform?
With the rapid development of digital technology, the human society has moved from the traditional industrial era dri...
Ratio Chain Research Institute | A Threshold Signature System under the Hypochronous Network Hypothesis
In recent years, threshold cryptography has gradually been applied in the blockchain system, which is divided into th...
Bitcoin developers: 51% of attacks are not terrible, terrible is the disregard of decentralization
Recently, some netizens have asked questions in Reddit. Since the biggest weakness of the Bitcoin network is 51% atta...
Introduction to Technology | Solidity Programming Language: Introduction to Basic Compilation Principles and Adding New Instructions
Objective of this paper The main purpose of this paper: 1. Understand the basic compiling principle of solidity 2. Le...

- You may be interested
- CT detection of new coronary pneumonia ...
- The road to Ethereum 2.0
- Popular Science | Nine Questions Take Y...
- Overview of EDCON Super Demo Winning Pr...
- Understanding Farcaster, the decentrali...
- Half a year has skyrocketed nearly four...
- How can AI open up incremental markets ...
- Market price is the consensus | 2019 La...
- Wells Fargo wants to launch cryptocurre...
- Canadian Securities Authority incorpora...
- Babbitt column | Inciting oligarchy int...
- The EOS community has another big event...
- Ethereum's killer app could "...
- Samsung SDS uses zero-knowledge proof t...
- LianGuai Daily | Hong Kong police take ...
Find your business way
Globalization of Business, We can all achieve our own Success.