Furkan Akalfurkanakal.com路Jan 28, 2024Exploring Lit Protocol: Building Lit Actions w/ Lit JS SDKWelcome to the 3rd post of this blog where we will try to discuss about Lit Protocol, how it works, and of course, how to build on top of it. Before starting, it is worth noting that this is NOT a paid content. Contents What is Lit Protocol?, Fun...53 readsExploring Protocolslit
IMBANGA.imbanga.hashnode.dev路Sep 30, 2023An Educational Article About Programmable Key Pairs. (PKPs)Introduction. Are you new to Programmable Key Pairs?? Don't worry because this article has you covered. By the end, you are going to get an in-depth understanding of what PKPs mean, how they work and how you can integrate them into your projects as a...10 likesCryptography
Nyikwagh Mosesmos-nyik.hashnode.dev路Jul 17, 2023Programmable Key Pairs (PKPs): An Overview and Quick Start GuideIntroduction: Programmable Key Pairs (PKPs) have revolutionized the field of secure communication and cryptographic operations. PKPs offer developers a powerful toolset to manage encryption, authentication, and digital signatures. In this article, we...lit
Aimuamhonose Imarengiayekimonic.hashnode.dev路Jun 29, 2023Programmable Key Pairs (PKPs): A Versatile Tool for Secure AuthenticationIntroduction When it comes to the field of secure authentication PKPs are the future, Programmable Key Pairs (PKPs) have emerged as a powerful tool.PKPs offer a flexible and efficient approach to authentication, providing developers with a secure mea...65 readsBlockchain
Armstrong Olawandearmstrongolawande.hashnode.dev路Jun 26, 2023Programmable Key PairsIntroduction Programmable Key Pairs (PKPs) represent an advancement in the domain of decentralized applications and blockchain technology. They provide a user-friendly and secure solution for interacting with Web3 applications, benefiting both develo...1 likelitprotocol
Adakole Jeffreyprogrammablekeypairs.hashnode.dev路Jun 22, 2023Programmable Key PairsOverview Understanding Programmable Key Pairs 馃捇 Programmable Key Pairs (PKPs) are cryptographic systems that use two keys: a public key and a private key. Both the public key and the private key are used to encrypt and decode data. Because the keys ...litprotocol
Harikrishnan Kannothhxri.hashnode.dev路Jun 22, 2023Programmable Key Pairs [LIT Protocol]Introduction: In the realm of cybersecurity, maintaining secure and robust key management is of paramount importance. Programmable Key Pairs (PKPs) have emerged as a valuable tool in this regard. PKPs enable developers to dynamically manage cryptogra...41 readslitprotocol
Narbeh ShahnazarianforDeveloper DAO Blog | Web3 Tutorialsblog.developerdao.com路Jun 10, 2023DevNTell - Auth with Lit Protocol馃寛 GM In this week's episode of DevNTell, Josh Long gave us an overview of Authentication with Lit Protocol 馃専 Developer Spotlight Josh is an engineer in the web3 space with a focus on developer tooling. Having worked for web3 and IoT companies, Josh...40 readsDevNTellWeb3