-
Algorand(ALGO)
Algorand_s consensus mechanism is permissionless and pure proof-of-stake. It ensures full participation, protection, and speed within a truly decentralized network.
word2019-12-04
-
Quantum algorithm
Based on classical algorithms, quantum algorithms use some essential features of quantum computation
word2020-02-12
-
Signature algorithm
A signature algorithm is a cryptographic algorithm that protects the security of blockchain.
word2020-02-12
-
EdDSA
Edwards-curve Digital Signature Algorithm _EdDSA_ is a cryptographic algorithm used by ADA, Stellar, Lisk, NEM, XMR, Tezos.
word2020-02-12
-
Shor's Algorithm
A quantum algorithm that can both operate large integer factorization and discompose discrete logarithm.
word2020-02-12
-
Grover
A quantum algorithm that can search targeted number in digital field.
word2020-02-12
-
Secure Hash Algorithm 256
An abstract in computing that can be achieved by SHA256Managed. SHA256 has values of SHA256 is 256 bits.
word2020-02-12
-
Extremal optimization (EO)
A heuristic initially proposed by Boettcher at the World Summit on Genetic and Evolutionary Computation.
word2020-02-12
-
Quantum Prime Factor
In the quantum algorithm, the figure that can decompose prime numbers is called a prime factor, e,g, in the equation 50=2*5*5, 50 is a prime factor, and 2,5,5 are prime numbers.
word2020-02-12
-
Hybrid Consensus
It is a sys tem designed to enhance the efficiency of a single consensus mechanism, usually integrated with more than 2 consensus protocols.
word2019-12-04
-
Cross-Chain Interaction of Heterogeneous Chains
One of the cross-chain interactive technology,
word2020-02-12
-
Cross-Chain Interaction of Isomorphic Chains
One of the cross-chain interactive technology, which is easy to achieve interaction between the chains.
word2020-02-12
-
跨平台挖掘
指在不同的平台上发掘不同硬件的计算能力,即矿工可以用矿机在不同的挖矿平台里面挖矿。
word2020-02-11
-
Asymmetric Cryptographic Algorithm
Known as a cryptographic algorithm, it requires 2 keys, the public key for encryption and the private key for decryption.
word2020-03-03
-
Merkle Tree
Also known as Hash Tree, a Merkel Tree is a tree-like data structure.
word2020-02-19
-
Ciphertext
Refers to the encrypted form of the plaintext.
word2019-12-07
-
Nounce
This is a string of automatically generated numbers during the process of mining. Using this string of numbers, miners are likely to figure out Hash Function to get the block reward.
word2019-12-04
-
Digital Signature
Similar to a personal signature singed on paper, a digital signature is a string of encrypted numbers developed by the message sender and impossible to forge by others.
word2020-02-11
-
Cryptocurrency
It is a virtual currency developed by using cryptography and encryption techniques.
word2020-01-09
-
Plaintext
It refers to the readable information transmitted from a sender to a receiver.
word2019-12-05