How are things authenticated in blockchain networks? Discover the role of public key cryptography, hash functions and digital signatures in helping make cryptographic-level secure systems.
This video is part of a broader course curriculum of the Ethereum Developer Bootcamp in Alchemy University. For the full experience, please sign up today at university.alchemy.com
00:00 – What is symmetric key cryptography?
02:57 – What is asymmetric key cryptography?
06:22 – Public key cryptography in Web3
Error: Contact form not found.