Short Proofs of Hall’s and Kőnig’s TheoremsThe motivation of this post is to provide a concise proof concept that can be used to prove both Hall’s marriage theorem and Kőnig’s…Jan 2, 2021Jan 2, 2021
Doud’s Method: Using the theory of elliptic curves over C to do something useful over QRecall that there exists a one-to-one correspondence between lattices (in the complex plane) and elliptic curves over C (the field of…Jul 14, 2020Jul 14, 2020
Side Notes on Differential PrivacyIn the following set of (side) notes, I shed light on aspects of differential privacy that I believe could benefit from clearer…Jun 16, 2020Jun 16, 2020
Published inHackerNoon.comMoving Forward: 4 Key Details Every ICO White Paper Should IncludeHere are the 4 key details that every ICO white paper should include, in order to bring more legitimacy to the market moving forward.May 5, 20184May 5, 20184
Published inChain IntelligenceInitial Fork Offering (IFO): Six more Bitcoin forks on their way in the coming weeks of DecemberThere are actually six more forks on the Bitcoin blockchain allegedly on their way. Here are the forks in chronological order.Dec 9, 20171Dec 9, 20171
Published inChain Intelligence[TLDR Guide] Bitcoin Private Key, Public Key, and Public AddressA public-key cryptography (or asymmetrical cryptography) is one that uses pairs of keys: 1. public key (open to anyone); and 2. private key…Nov 18, 20172Nov 18, 20172