|
You are here |
vitalik.eth.limo | ||
| | | | |
www.jeremykun.com
|
|
| | | | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | |
| | | | |
andrea.corbellini.name
|
|
| | | | | ||
| | | | |
blog.lambdaclass.com
|
|
| | | | | Introduction Zero-knowledge proofs, also known as ZKPs, are becoming popular due to their numerous applications in delegating computations to untrusted servers and addressing scalability issues in decentralized ledgers. By using ZKPs, we can prove the validity of a given computation without revealing sensitive information, and the proof is short and | |
| | | | |
www.elliptic.co
|
|
| | | Explore our Learning Resources Country Guides to stay updated on the latest cryptoasset regulation in your local market. Get practical summaries by on-the-ground experts. From Australia to the United States, we've got you covered. Dive into the basics of blockchain and cryptoassets, understand regulations like AML and KYC, and expand your knowledge with our comprehensive glossary. Join us on the journey to navigate the world of crypto with confidence. | ||