Articles in this series
Towards the close of 2022, a notable development emerged in the realm of cryptography as a team challenged the security of RSA using quantum...
Introduction Zero-knowledge proofs (ZKPs) are cryptographic protocols that enable a prover to prove the truth of a statement to a verifier without...
Recently I’ve been through a journey optimizing cycle consumption of merkle-mountain-range’s verifier. It’s been a fascinating and surprising trip so...
Being a cross-platform and embeddable scripting language, Lua is well-known for its simplicity and ease of use. To facilitate contract development on...
In a typical signature scheme, we usually take the witness and the hash of a transaction as parameters and use a hashing algorithm to generate a...
Why xUDT? Simple UDT (also known as sUDT, simple User Defined Token), by definition, is simple in design, and thus may not be enough for many use...