โŒ›
The Game of $CHOICES
Ctrlk
  • [ ๐šˆ๐š˜๐šž ๐šŠ๐š›๐šŽ ๐šœ๐šž๐š™๐š™๐š˜๐šœ๐šŽ๐š ๐š๐š˜ ๐š‹๐šŽ ๐š๐š›๐šŽ๐šŽ ]
  • โœจIs Free Will Real?
    • โœจ[ ๐™ป๐š’๐š๐šŽ ๐š’๐šœ ๐šˆ๐š˜๐šž๐š› ๐™ณ๐š›๐šŽ๐šŠ๐š– ]
    • โœจ[ ๐™พ๐š™๐šŽ๐š— ๐šข๐š˜๐šž๐š› ๐š–๐š’๐š—๐š, ๐š’๐š ๐š๐šŽ๐šŽ๐š•๐šœ ๐š๐š˜๐š˜๐š ]
    • โณChoose your adventure
      • ๐Ÿฆธโ€โ™€๏ธ๐š‚๐š๐š˜๐š›๐šข๐š๐šŽ๐š•๐š•๐š’๐š—๐š
      • ๐Ÿ’€๐™ท๐šž๐š–๐šŠ๐š—๐š’๐šœ๐š–
      • ๐Ÿ”ญ๐™ฐ๐šœ๐š๐š›๐š˜๐š™๐š‘๐šข๐šœ๐š’๐šŒ๐šœ
      • ๐Ÿ’ป๐™ฝ๐šŽ๐š˜-๐™ฒ๐šข๐š™๐š‘๐šŽ๐š›๐š™๐šž๐š—๐š”
        • ๐šƒ๐š‘๐šŽ $๐™ฒ๐™ท๐™พ๐™ธ๐™ฒ๐™ด ๐š˜๐š ๐šƒ๐š‘๐šŽ ๐™ผ๐šŠ๐šŒ๐š‘๐š’๐š—๐šŽ
          • ๐Ÿ‘ฉ๐Ÿฝโ€๐Ÿ’ป๐™ฐ ๐™ฑ๐š›๐š’๐šŽ๐š ๐š‚๐š๐š˜๐š›๐šข ๐š˜๐š ๐™ฒ๐š˜๐š–๐š™๐šž๐š๐šŽ๐š›๐šœ
          • ๐Ÿ‘ฉ๐Ÿฝโ€๐Ÿ’ป๐™ฒ๐š›๐šข๐š™๐š๐š˜๐š๐š›๐šŠ๐š™๐š‘๐šข
            • Cryptography is a right
              • Asymmetric cryptography
              • Hash functions
              • ECDSA
              • Entropy in Computer Sciences
              • Pseudo-random functions
              • Digital signatures
            • What's a Cypherpunk?
          • ๐Ÿ‘ฉ๐Ÿฟโ€๐Ÿ’ป๐™ฑ๐š•๐š˜๐šŒ๐š”๐šŒ๐š‘๐šŠ๐š’๐š—๐šœ
          • ๐Ÿ‘จ๐Ÿพโ€๐Ÿ’ป๐™ท๐šŠ๐šŒ๐š”๐š’๐š—๐š
          • ๐Ÿ‘ฉ๐Ÿฝโ€๐Ÿ’ป๐™ผ๐šŠ๐šŒ๐š‘๐š’๐š—๐šŽ ๐™ป๐šŽ๐šŠ๐š›๐š—๐š’๐š—๐š, ๐™ฐ๐™ธ, ๐šŠ๐š—๐š ๐š‚๐š’๐š—๐š๐šž๐š•๐šŠ๐š›๐š’๐š๐šข
          • ๐Ÿ‘ฉ๐Ÿฟโ€๐Ÿ’ป๐™ฑ๐šŽ๐šŒ๐š˜๐š–๐šŽ ๐šŠ ๐š‘๐Ÿบ๐šก๐Ÿถ๐š›
      • ๐Ÿ”Ž๐š๐šŽ๐š–๐š˜๐š๐šŽ ๐š…๐š’๐šŽ๐š ๐š’๐š—๐š
      • ๐Ÿ–ผ๏ธ๐™ฟ๐šŠ๐š๐š๐šŽ๐š›๐š— ๐š๐šŽ๐šŒ๐š˜๐š๐š—๐š’๐š๐š’๐š˜๐š—
      • ๐Ÿ”ฅ๐™ฐ๐š•๐šŒ๐š‘๐šŽ๐š–๐šข [ ๐š‘๐šŠ๐š›๐š ๐š–๐š˜๐š๐šŽ ]
      • โœจ๐š๐šŽ๐šŠ๐š•๐š’๐š๐šข [ ๐š‘๐šŠ๐š›๐š ๐š–๐š˜๐š๐šŽ ]
Powered by GitBook
On this page
  • Elliptic curve digital signature algorithm is a
  • cryptographic algorithm used by Ethereum to
  • ensure that funds can only be spent by owners.
  • It's how public and private keys are created
  • and used for account address generation
  • and transaction verification.
  1. โœจIs Free Will Real?
  2. โณChoose your adventure
  3. ๐Ÿ’ป๐™ฝ๐šŽ๐š˜-๐™ฒ๐šข๐š™๐š‘๐šŽ๐š›๐š™๐šž๐š—๐š”
  4. ๐šƒ๐š‘๐šŽ $๐™ฒ๐™ท๐™พ๐™ธ๐™ฒ๐™ด ๐š˜๐š ๐šƒ๐š‘๐šŽ ๐™ผ๐šŠ๐šŒ๐š‘๐š’๐š—๐šŽ
  5. ๐Ÿ‘ฉ๐Ÿฝโ€๐Ÿ’ป๐™ฒ๐š›๐šข๐š™๐š๐š˜๐š๐š›๐šŠ๐š™๐š‘๐šข
  6. Cryptography is a right

ECDSA

Elliptic curve digital signature algorithm is a

cryptographic algorithm used by Ethereum to

ensure that funds can only be spent by owners.

It's how public and private keys are created

and used for account address generation

and transaction verification.

PreviousHash functionsNextEntropy in Computer Sciences

Last updated 1 year ago