Cryptography & Blockchain Infographic

Cryptography & Blockchain Infographic

Cryptography & Blockchain If two or more people want to securely transact over the internet proving their identity they can make use of asymmetric cryptography or public-private key cryptography where each of them holds a private key and a public key. The purpose...
Token Security: Cryptography – Part 2

Token Security: Cryptography – Part 2

The content of this page has evolved over the years (check wayback machine for previous iterations) and was last updated in July 2019, with an excerpt from the book Token Economy which builds – among others – on the educational blogposts that have been...
Token Security: History of Cryptography

Token Security: History of Cryptography

The content of this page has evolved over the years (check wayback machine for previous iterations) and was last updated in July 2019, with an excerpt from the book Token Economy which builds – among others – on the educational blogposts that have been...