stories in this tag
Does The Best Secure Email Really Exist?
Protocols Should Be Designed by Amateurs
The report on Cryptoeconomics Moscow Meetup #5: zk-cryptography
Understanding Quantum Cryptography
Cryptography For Software Engineers
How to explain the power of blockchains to your non-tech friends
Cryptography in Programming pt 2 — Diving into Encryption
Crypto transactions for all: sending Litecoin via Telegram and SMS is here.
Solutions for private key management in decentralized apps
Speeding up crypto on Wire desktop apps
How I finally started learning new things like Cryptography
ZCoin’s new anonymous payment system, Lelantus
Conditional payments on “Bitcoin” using Discreet Log Contracts
Preventing Bad Actors from Overtaking Social Networks
Blockchain Cryptography Explained to a 9-Year-Old
Zero knowledge proofs with Sigma protocols
#Zero Knowledge Proofs
Measuring Trust and Reputation in Social Networks
Cryptography, Anonymity, and their Roles in a Free Society
Password Stretching using Key Derivation Function(KDF)
Sodimu Segun Michael
Privacy is dead. Long live privacy.
An Introduction to Public Key Cryptosystems with RSA
A Decade Into Adopting Digital and Paperless Technologies, Where Do We Stand?
A Guide to Post-Quantum Cryptography
Don’t Let Them Spit in Your Beer: Decentralization Beyond Blockchain
Public Key Cryptography Simply Explained
Zero-Knowledge Proofs: A Layman’s Introduction
Whitfield Diffie on the History of Cryptography
Ethereum Support for ZK-SNARKs
Generating RSA Private and Public Keys
Understanding The Elusive Blockchain Technology — Part 1
Distributed PKI: Development and Use Cases
#Public Key Cryptography
Fraud proofs — Secure on-chain scalability
Will We Ever Run Out of Bitcoin Wallets?
A Primer on Zero-Knowledge Proofs 🔏
#Zero Knowledge Proofs
Cryptographic essence of Bitcoin: Part 2 — How do public/private keys work?,
Cryptographic essence of Bitcoin part # 1: What is a Hash function?
Smart Contracts, Part 3: Standardisation
Adventures of an Enclave (SGX / TEEs)
EOS FOR IDIOTS: How To Change Your EOS Active Key Using Greymass
What’s Shor’s Algorithm? (Quantum Computing Weekly News for Dec 11 2018)
Alex’s notes on ZK-STARKs
Smart Contracts, Part 2: The Legality
Smart Contracts, Part 1: The State of Security
RS256 in OCaml/ReasonML
Reusable Payment Codes — the Secret Ingredient to a User-Friendly Crypto Wallet?
Asymmetric Cryptography In Blockchains
IoTeX: The People Behind The Project
Dr Shaun Conway
What’s EOS life like after ERC20 wallets? In-game wallets we trust.
More price functions for Token-Bonding Curves
Blockchain Scalability: Do Layer I Solutions Hold the Key?
The Avalanche Effect
The Three Barriers to Mainstream Blockchain Adoption We Need to Be Talking About Now
Launching SparkLabs Cyber + Blockchain in Our Nation’s Capital
Hackernoon Newsletter curates great stories by real tech professionals
Get solid gold sent to your inbox. Every week!
Topics of interest
Best of Hacker Noon