Fabian Owuorsecp256k1, Private Key Generation, and the Musig Multisig Protocol in BitcoinThe world of cryptocurrency is built upon mathematical foundations, particularly in cryptography, to ensure security and privacy. At the…Oct 26
JamestervitFortifying Cyber Resilience: Integrating Post-Quantum Cryptography with Layer 2 Peer-to-Peer…In today’s hyper-connected world, the escalating frequency and sophistication of cyber threats have underscored the critical need for…Oct 151Oct 151
Nicky ReinertThe Bitcoin PuzzleAlmost 10 years ago, when Bitcoin was a cheap and largely unappreciated niche phenomenon, someone initiated the “Bitcoin Puzzle.” It isn’t…Oct 4Oct 4
Kyodo TechArmory Pre-HD Wallets Deterministic Address DerivationBefore the widespread adoption of Hierarchical Deterministic (HD) wallets, early financial institutions managing customer wallets often…Jun 1Jun 1
Fabian Owuorsecp256k1, Private Key Generation, and the Musig Multisig Protocol in BitcoinThe world of cryptocurrency is built upon mathematical foundations, particularly in cryptography, to ensure security and privacy. At the…Oct 26
JamestervitFortifying Cyber Resilience: Integrating Post-Quantum Cryptography with Layer 2 Peer-to-Peer…In today’s hyper-connected world, the escalating frequency and sophistication of cyber threats have underscored the critical need for…Oct 151
Nicky ReinertThe Bitcoin PuzzleAlmost 10 years ago, when Bitcoin was a cheap and largely unappreciated niche phenomenon, someone initiated the “Bitcoin Puzzle.” It isn’t…Oct 4
Kyodo TechArmory Pre-HD Wallets Deterministic Address DerivationBefore the widespread adoption of Hierarchical Deterministic (HD) wallets, early financial institutions managing customer wallets often…Jun 1
Guilherme Balena VersianiCrypto Pills #18: Threshold ECDSAThreshold ECDSA has garnered significant attention in the cryptography community due to the widespread use of ECDSA in internet-based…Nov 19
AbelianA response to How to hard-fork to save most users’ funds in a quantum emergency by Vitalk ButerinThis blog post responds to Vitalik Buterin’s proposed strategies against quantum threats, outlined in Ethereum Research.Mar 13
Prof Bill Buchanan OBE FRSEThe Basics of Ethereum Keys, IDs and SignaturesNode.js is a great advancement in creating back-end code. So, let’s use it to understand how Ethereum uses its keys and signs for messages…Apr 15, 2022