
Cryptography
Majorana 1 chip offers breakthroughs in quantum computing
Microsoft's Majorana 1 chip signifies a leap in quantum computing, but developers in the blockchain community should still be wary...
Faketoshi Series Part 4: Len Sassaman
In this article, we explore Len Sassaman's contribution to the cryptographic community and the plausible evidence as to why, despite...
Threshold Signatures: Private key never exists
Working as a cryptographic protocol, the Threshold Signature Scheme enhances security and trust in distributed systems by ensuring that no...
Distributed Key Generation: Verifiable and dealerless
Distributed Key Generation enhances security in various applications by distributing trust among participants, reducing the risk of key compromise.
Steganography and its applications in Bitcoin
There is a thin line differentiating stenography from cryptography, with the latter using encryption to make files unreadable while the...
Verifiable Ownership Framework: Establishing trust in cryptographic proof of ownership
In this post, Dr. Craig Wright argues how cryptographic proof of ownership necessitates the establishment of a secure, verifiable link...
Recent
Trending
Most Views