#### How does Keccak work?

someone help me about how does the conversion from keccak string to uint work? Generally, how does solidity convert a string to uint? more

#### Quantum computing

Many say that quantum computers could hack blockchain's security. What exactly makes quantum computers so powerful? more

#### Use eth key pair to sign-verify and encrypt-decrupt a file

Hello, I want to know if you would be possible to sign-verify ad encrypt-decrypt a file using ethereum key pairs as they are ECDSA com... more

#### How is asymmetric cryptography used in blockhain?

How is asymmetric cryptography used in blockchain?

#### Sending secret message using public key encryption

Can someone help me warp my head around the fundemnetals of sending secret messange using public key cryptography. As I understand the process of d... more

#### What makes a cryptographic hash function secure?

What makes a cryptographic hash function secure?

#### 256 bit encryption vs quantum computing

How will quantum computing change current encryption?

#### what are Algorithm, cryptography methods and key concepts which are used in blockchain technology ?

What are the main key Algorithms used in blockchain technology to secure the network and decentralization purpose by knowing these algorithms which... more