Keyless Signature Infrastructure (KSI)

Keyless Signature Infrastructure (KSI) is designed to provide scalable digital signature based authentication for electronic data, machines and humans. KSI uses only hash-function cryptography, allowing verification to rely only on the security of hash-functions and... Read More

Merkle Tree

A Merkle TreeA shared application layer is an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communications network. also known as a binary hash tree. It is a data structure used for summarizing and then verifying the... Read More

Private Key

A private keyQuantum key distribution (QKD) uses quantum mechanics to secure a communication channel. It enables two different parties to develop a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. What makes quantum... Read More

Quantum Key Distribution

Quantum key distributionThe cryptographic function used as the basis the proof of work system employed by Bitcoin. (QKD) uses quantum mechanics to secure a communication channel. It enables two different parties to develop a shared random secret key known only to... Read More

SHA 256

The cryptographic function used as the basis the proof of work system employed by BitcoinA Cryptocurrency address is used to receive and send transactions on the network. An address is most commonly represented as a string of alphanumeric characters and sometimes... Read More