Результатов: 177

STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03


Фото:

Op Ed: Addressing the Threat of Cryptomining Malware

One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »

2018-7-18 23:18


Фото:

How Digital Signatures and Hashing Protect Your Transactions

Digital Signatures and Hashing Digital signatures and cryptographic hash functions comprise the secret sauce that makes cryptocurrency work.  They put the crypto into currency, so to speak. Your digital signature proves you have the private key that claims ownership of… The post How Digital Signatures and Hashing Protect Your Transactions appeared first on CoinCentral. дальше »

2018-7-12 14:47


1234