# Cryptography

Cryptography in blockchain

Cryptography is key to the security of the blockchain ledger. Each transaction is recorded on the blockchain using encrypted data. Each user can acces...

Asymmetric cryptography in blockchain

Asymmetric cryptography in the blockchain. Asymmetric cryptography is useful because it uses two different keys: a private key and a public key. The p...

Types of cryptography

Three types of cryptography: secret-key, public key, and hash function. What are the 2 types of cryptography?What is cryptography its types and how it...

Crypto mathematics

Cryptography Mathematics – This refers to the use of mathematical techniques to encode plain text with hash functions and perform crypto-analysis to i...

Certicom research

What does Certicom do?Who discovered ECC?Why ECC is preferred over RSA?Is ECC more secure than RSA?Is ECC secure?Why did Britain not join the EEC?Whi...

Cryptography resources

Useful Cryptography ResourcesRoot Labs rdist. ... Bristol Cryptography Blog. ... Travis Goodspeed. ... Matasano Chargen. ... Light Blue Touch Paper (U...

Cryptography blog

How much do cryptographers get paid?Is cryptography well paid?Is cryptography an engineer?What does a cryptographic engineer do?Are cryptographers in...

Applied cryptography pdf

What is Applied Cryptography?Where is cryptography applied?How is cryptography applied for security?What is the study of cryptology?Is AES perfectly ...

Learn cryptography

Can I learn cryptography on my own?Is cryptography hard to learn?How long will it take to learn cryptography?Are cryptographers in demand?Is cryptogr...