The "Millionaire" problem raised by Yao Zhizhi has been cracked. What kind of ghost is the multi-party safe computing MPC?

In an increasing number of concerns about data privacy, the government began to act to develop a ...

How is practical programmability implemented in the securities pass?

Recently, someone asked me what is the most interesting function of the securities pass. The auth...

Decred technical white paper Chinese version

Two years ago, I took the time to translate the technical white paper of Decred. The original add...

Elliptic Curve Cryptography & Workload Proof

Most cryptographic assets use an elliptical curve identical to Bitcoin, called secp256k1. This ma...

Technical Guide | Ethereum Wallet Development: Generate Account Address, Private Key, Keystore, mnemonic

First, use web3 to connect to the Ethereum network (test network, main network) 1. What is web3 W...

Restoring the entire process of asset transfer: $6.02 million stolen from the DragonEX exchange

In the early morning of March 24th, Beijing time, the DragonEX exchange issued a notice stating t...

Popular Science | Hash Function Brief

Hash functions are an integral part of blockchain technology and can be used for a variety of pur...

In-depth understanding of IPFS (1): Beginner to Advanced Guide

This article is the first in a series of "In-depth Understanding of IPFS" series. This ...

The first long-term supported version, Hyperledger launches Fabric v1.4 LTS

Recently, Hyperledger (superbook) has launched a new version of Fabric v1.4 LTS, this version is ...

The Uncle Block of the Ethereum Reward Mechanism (Part 2)

As mentioned in the previous article, the three factors of reward reduction, mining difficulty co...