frolov_max over 1 year ago

How does Keccak work?

someone help me about how does the conversion from keccak string to uint work? Generally, how does solidity convert a string to uint? more

Karma symbol 10
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 1
Total Comments to this question

paul_musgrave about 1 year ago

Quantum computing

Many say that quantum computers could hack blockchain's security. What exactly makes quantum computers so powerful? more

Karma symbol 0
Total Karma earned answering this question
Up gray arrow normal 0
Total Votes for this question
Speach bubble 2
Total Comments to this question

aitiba about 1 year ago

Use eth key pair to sign-verify and encrypt-decrupt a file

Hello, I want to know if you would be possible to sign-verify ad encrypt-decrypt a file using ethereum key pairs as they are ECDSA com... more

Karma symbol 15
Total Karma earned answering this question
Up gray arrow normal 1
Total Votes for this question
Speach bubble 1
Total Comments to this question

nujabes403 about 1 year ago

Who decides BIP39 words?

Who decides BIP39 words?

Karma symbol 20
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 2
Total Comments to this question

j1koc5 about 1 year ago

How is asymmetric cryptography used in blockhain?

How is asymmetric cryptography used in blockchain​?

Karma symbol 5
Total Karma earned answering this question
Up gray arrow normal 1
Total Votes for this question
Speach bubble 2
Total Comments to this question

thegamechanger237 about 1 year ago

Sending secret message using public key encryption

Can someone help me warp my head around the fundemnetals of sending secret messange using public key cryptography. As I understand the process of d... more

Karma symbol 140
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 4
Total Comments to this question

david.bowler1 about 1 year ago

What makes a cryptographic hash function secure?

What makes a cryptographic hash function secure?

Karma symbol 40
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 4
Total Comments to this question

austin16269 15 days ago

256 bit encryption vs quantum computing

How will quantum computing change current encryption?

Karma symbol 10
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 0
Total Comments to this question

guntuku.shiva about 1 year ago

what are Algorithm, cryptography methods and key concepts which are used in blockchain technology ?

What are the main key Algorithms used in blockchain technology to secure the network and decentralization purpose by knowing these algorithms which... more

Karma symbol 20
Total Karma earned answering this question
Up gray arrow normal 2
Total Votes for this question
Speach bubble 3
Total Comments to this question