-
Shor's Algorithm
A quantum algorithm that can both operate large integer factorization and discompose discrete logarithm.
word2020-02-12
-
Secure Hash Algorithm 256
An abstract in computing that can be achieved by SHA256Managed. SHA256 has values of SHA256 is 256 bits.
word2020-02-12
-
Asymmetric Cryptographic Algorithm
Known as a cryptographic algorithm, it requires 2 keys, the public key for encryption and the private key for decryption.
word2020-03-03
-
Consensus Algorithm
It is a process in computer science used to achieve agreement on a single data value among distributed processes or _s.
word2020-03-22
-
Hash Algorithm
An encryption function that is able to transform any information into a fixed-length string.
word2020-04-30
-
Encryption Algorithm
It is a kind of algorithm which encrypts the original information into a series of unreadable cipher-text, while the process is irreversible.
word2019-12-05
-
Algorithm Stablecoin
指基于算法控制货币供应数量,价值稳定的加密货币。
word2021-01-11
-
Quantum algorithm
Based on classical algorithms, quantum algorithms use some essential features of quantum computation
word2020-02-12
-
Signature algorithm
A signature algorithm is a cryptographic algorithm that protects the security of blockchain.
word2020-02-12
-
EdDSA
Edwards-curve Digital Signature Algorithm _EdDSA_ is a cryptographic algorithm used by ADA, Stellar, Lisk, NEM, XMR, Tezos.
word2020-02-12
-
Grover
A quantum algorithm that can search targeted number in digital field.
word2020-02-12
-
Extremal optimization (EO)
A heuristic initially proposed by Boettcher at the World Summit on Genetic and Evolutionary Computation.
word2020-02-12
-
Quantum Prime Factor
In the quantum algorithm, the figure that can decompose prime numbers is called a prime factor, e,g, in the equation 50=2*5*5, 50 is a prime factor, and 2,5,5 are prime numbers.
word2020-02-12
-
Hybrid Consensus
It is a sys tem designed to enhance the efficiency of a single consensus mechanism, usually integrated with more than 2 consensus protocols.
word2019-12-04
-
Cross-Chain Interaction of Heterogeneous Chains
One of the cross-chain interactive technology,
word2020-02-12
-
Cross-Chain Interaction of Isomorphic Chains
One of the cross-chain interactive technology, which is easy to achieve interaction between the chains.
word2020-02-12
-
跨平台挖掘
指在不同的平台上发掘不同硬件的计算能力,即矿工可以用矿机在不同的挖矿平台里面挖矿。
word2020-02-11
-
Merkle Tree
Also known as Hash Tree, a Merkel Tree is a tree-like data structure.
word2020-02-19
-
Ciphertext
Refers to the encrypted form of the plaintext.
word2019-12-07
-
Nounce
This is a string of automatically generated numbers during the process of mining. Using this string of numbers, miners are likely to figure out Hash Function to get the block reward.
word2019-12-04