Public Key Encryption – RSA

Introduction RSA is a public-key cryptosystem developed by Ron Rivest, Adi Shamir and Leonard Adleman and published in 1977. The encryption key (public key) […]

What is it? Impermanent loss occurs when the value of assets held in an Automated Market Maker (AMM) liquidity pool […]

According to the great well-known Euler’s formula: eiθ=cos⁡θ+isin⁡θ Let θ=π/2, then: eiπ/2=cos(π/2)+isin(π/2)=0+i×1=i Now, doing a substitution i with eiπ/2: ii=(eiπ/2)i=(eπ/2)i2=e−π/2=0.207879… How beautiful!

This technique gained popularity in the early days of computer graphics when processing power was limited. It’s an approximation method […]

Have you ever wondered how Google Authenticator works? Or I wondered how the bank could use a token to generate […]

The Halting Problem is a famous problem in the field of computer science and mathematical logic. It was first formulated […]

Scroll to Top