Zero-knowledge proof

temuland crypto glossary zero-knowledge proof
aischle
Posted by aischle
17.08.2021

Zero-knowledge proof

Zero-Knowledge Proof proposes a technique that employs cryptographic algorithms so that various...

Read More
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a Digital Signature Algorithm (DSA) that uses keys derived from elliptic curve cryptography (ECC).
aischle
Posted by aischle
11.07.2021

ECDSA

offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic...

Read More
temuland crypto glossary - quantum computing
aischle
Posted by aischle
5.07.2021

Quantum Computing

Quantum computers perform calculations based on the probability of an object's state before...

Read More
Gitian building is an open-source software program that offers a virtual space enabling different developers to reliably cross-check their binaries.
aischle
Posted by aischle
24.06.2021

Gitian Building

Gitian building is an open-source software program that offers a virtual space...

Read More
temuland crypto glossary turing complete
aischle
Posted by aischle
4.06.2021

Turing complete

A Turing-complete language (also called a universal language) is one where you...

Read More
temuland crypto glossary asymmetric cryptography
aischle
Posted by aischle
28.05.2021

Asymmetric cryptography

Asymmetric cryptography is a process that uses a pair of related keys,...

Read More
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message.
aischle
Posted by aischle
28.05.2021

Digital Signature

a mathematical technique used to validate the authenticity and integrity of a...

Read More
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size (the "hash).
aischle
Posted by aischle
29.04.2021

Cryptographic hash functions

A cryptographic hash function is a mathematical algorithm that maps data of...

Read More
temuland crypto glossary merkle tree
aischle
Posted by aischle
28.04.2021

Merkle tree

A Merkle tree is a data structure that serves to encode blockchain...

Read More
Cryptographic nonces are random or pseudo-random numbers that authentication protocols attach to communications.
aischle
Posted by aischle
28.04.2021

Cryptographic nonce

a number used to protect private communications by preventing replay attacks

Read More
[gravityform id="1" title="false" description="false" ajax="true"]