Algorithmic Bias

algorithmic bias
Butsch
Posted by aischle
30.01.2022

Algorithmic Bias

Algorithmic bias describes systematic and repeatable errors in a computer system that...

Read More
temuland crypto glossary schnorr signature
Butsch
Posted by aischle
17.01.2022

Schnorr Signature

In cryptography, a Schnorr signature is a digital signature produced by the...

Read More
temuland crypto glossary zero-knowledge proof
Butsch
Posted by aischle
17.08.2021

Zero-knowledge proof

Zero-Knowledge Proof proposes a technique that employs cryptographic algorithms so that various...

Read More
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a Digital Signature Algorithm (DSA) that uses keys derived from elliptic curve cryptography (ECC).
Butsch
Posted by aischle
11.07.2021

ECDSA

ECDSA offers a variant of the Digital Signature Algorithm (DSA) which uses...

Read More
temuland crypto glossary - quantum computing
Butsch
Posted by aischle
5.07.2021

Quantum Computing

Quantum computers perform calculations based on the probability of an object's state before...

Read More
Gitian building is an open-source software program that offers a virtual space enabling different developers to reliably cross-check their binaries.
sabininja
Posted by Sabina Hofer
24.06.2021

Gitian Building

Gitian building is an open-source software program that offers a virtual space...

Read More
temuland crypto glossary turing complete
Butsch
Posted by aischle
4.06.2021

Turing complete

A Turing-complete language (also called a universal language) is one where you...

Read More
temuland crypto glossary asymmetric cryptography
Butsch
Posted by aischle
28.05.2021

Asymmetric cryptography

Asymmetric cryptography is a process that uses a pair of related keys,...

Read More
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message.
Butsch
Posted by aischle
28.05.2021

Digital Signature

a mathematical technique used to validate the authenticity and integrity of a...

Read More
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size (the "hash).
Butsch
Posted by aischle
29.04.2021

Cryptographic hash functions

A cryptographic hash function is a mathematical algorithm that maps data of...

Read More
temuland crypto glossary merkle tree
Butsch
Posted by aischle
28.04.2021

Merkle tree

A Merkle tree is a data structure that serves to encode blockchain...

Read More
Cryptographic nonces are random or pseudo-random numbers that authentication protocols attach to communications.
Butsch
Posted by aischle
28.04.2021

Cryptographic nonce

a number used to protect private communications by preventing replay attacks

Read More