Implementing EIP-712 on CKB-VM
In a typical signature scheme, we usually take the witness and the hash of a transaction as parameters and use a hashing algorithm to generate a transaction signature request (This code demonstrates the process). The result is a hexadecimal string as...
Jan 9, 202310 min read572


