4 followers
Cryptography, Mathematics and Blockchain Technology
Use Message Authentication Codes to ensure that transmitted data hasn't been tampered with · This Blog Post assumes some familiarity with Hash Functions....
Use Hash Functions to generate a cryptographic fingerprint of your data · Hash functions are Cryptography's workhorse. They're used in Digital Signature...
Notes about core cryptographic concepts, primitives and protocols used in the wild · There are many different definitions of Cryptography but if we break...
Learn Cairo and StarkNet Smart Contract programming with example code · Today I'm happy to announce the launch of my side-project "Cairo by Example" that...
Write your own Smart Contract that implements LP-Tokens in Cairo · A common pattern used in DeFi dApps is the Peer-to-Contract model in which one group...
Write your own Smart Contract that implements LP-Tokens in Solidity · In most DeFi Protocols users trade against a pool of liquidity implemented via a...