CryptapeforCryptape Jungleblog.cryptape.com·Dec 6, 2024Satoshi Scoop Weekly, 6 Dec 2024Crypto Insights Flexible Coin Earmarks Flexible Coin Earmarks allow the value of a single UTXO to be split across separate purposes. Each purpose is an "earmark" which can be executed by publishing a transaction that spends the coin, satisfies specif...DiscussSatoshi Scoop WeeklyBlockchain
Subhanshu Mohan Guptablogs.subhanshumg.com·Nov 30, 2024Ensuring Inter-Agent Data Integrity in Multi-Node DevSecOpsIntroduction In modern DevSecOps environments, where distributed systems and multi-node architectures are prevalent, ensuring data integrity during inter-agent communication is crucial. Compromised data exchanges can lead to system failures, vulnerab...Discuss·10 likes·36 readsAI powered DevOpsMultiNodeArchitecture
Joe Wangawanga.hashnode.dev·Nov 28, 2024Multiparty Computation: How it Allows for Secure CollaborationIntroduction Cryptography serves to keep statements between parties safe and secure. It allows the sending party to send messages only the receiving party will decipher, preventing unauthorized persons from decrypting the message even if it was inter...Discuss·2 likesMultiparty Computationzero-knowledge
louis chianglouischiang.hashnode.dev·Nov 28, 2024Public key tools and the trapdoor functionPublic key tools, such as Diffie-Hellman and RSA, can be used for key exchange, encryption, and digital signatures. We will discuss the applications of these scenarios later, but first, we need to cover the main concept of public key cryptography. Wh...DiscussCryptography
Meet Jainmeetjain.hashnode.dev·Nov 27, 2024Everything you need to know about quantum threats and safety.Keywords: Quantum Threats, cryptography(RSA & ECDSA), Blockchain We live in an era where technology moves at lightning speed, often times unable to keep up with the tech industry (a lot to digest). In this article will try to deep dive on one such to...Discuss·1 like·36 readsquantum computing
Jithu Josephjithu-joseph.hashnode.dev·Nov 26, 2024Quantum Cybersecurity: Safeguarding Data in the Quantum EraIntroduction As technology evolves, cybercriminals are also finding new ways to exploit it. One of the biggest breakthroughs is quantum computing, which can solve complex problems much faster than traditional computers. However, this power also threa...Discuss·1 like·48 readsquantum computing
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024Horrorible Crypt | CryptographyProblem Statement Can you find the encoded Message? 0beaeb0c17f05c53cb443b6f07d04c7674e47077d044595bf54648319fd1ab15 Flag Format: BUBT{Something} Prerequisites <not sure what to put here> (experience I guess?) Solution We didn’t manage to solve ...DiscussCyber Skills Bootcamp Competition | BUBTGOST cipher
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024Phonetic | CryptographyProblem Statement Encrypted text: Bravo Uniform Bravo Tango Four Lima Whiskey Four Yankee Five Seven Hotel One November Kilo Three Four Five Yankee Flag Format: BUBT{word1_word2_word3} Hint: lower case Prerequisites <not sure what to put here> (...DiscussCyber Skills Bootcamp Competition | BUBTbubt
Peter Garisomethingsomethingdevde.hashnode.dev·Nov 23, 2024What is Caesar's Cipher?Caesar's Cipher (Caesar's Shift Cipher) is one of the simplest and most well-known encryption techniques. Named after Julius Caesar, it works by shifting each letter in the plaintext by a fixed number of places down or up the alphabet. For example, w...DiscussGo Language
Legos Lightlegos.hashnode.dev·Nov 20, 2024Merkle Tree💡 Merkle Tree, hay còn gọi là Cây Merkle, là một cấu trúc dữ liệu quan trọng trong lĩnh vực mật mã học và khoa học máy tính, được phát minh bởi nhà mật mã học Ralph Merkle vào năm 1979. Merkle Tree đóng vai trò thiết yếu trong nhiều hệ thống lưu trữ...DiscussCryptography & Blockchainmerkle tree