#ethereum
Read more stories on Hashnode
Articles with this tag
Ep 6-2 of Cryptape Vanguard 2020-2022 Blockchain Research Panorama Series · In this talk, we will give an overview of recent techniques for light clients...
In a typical signature scheme, we usually take the witness and the hash of a transaction as parameters and use a hashing algorithm to generate a...
Why xUDT? Simple UDT (also known as sUDT, simple User Defined Token), by definition, is simple in design, and thus may not be enough for many use...
Caching is extensively used in modern software because it boosts system efficiency by storing transient data to make later retrievals easier. Reading...
As the first study on shard allocation, the overlooked core component for shared permissionless blockchains, this paper provides the first study on...
Abstract Our main use case features multiple companies that iteratively optimize on the architectural properties of aircraft components in a...