Kevin ChoiShort Proofs of Hall’s and Kőnig’s TheoremsThe motivation of this post is to provide a concise proof concept that can be used to prove both Hall’s marriage theorem and Kőnig’s…2 min read·Jan 2, 2021----
Kevin ChoiDoud’s Method: Using the theory of elliptic curves over C to do something useful over QRecall that there exists a one-to-one correspondence between lattices (in the complex plane) and elliptic curves over C (the field of…5 min read·Jul 14, 2020----
Kevin ChoiSide Notes on Differential PrivacyIn the following set of (side) notes, I shed light on aspects of differential privacy that I believe could benefit from clearer…10 min read·Jun 16, 2020----
Kevin ChoiinHackerNoon.comMoving Forward: 4 Key Details Every ICO White Paper Should IncludeHere are the 4 key details that every ICO white paper should include, in order to bring more legitimacy to the market moving forward.7 min read·May 5, 2018--4--4
Kevin ChoiinChain IntelligenceInitial Fork Offering (IFO): Six more Bitcoin forks on their way in the coming weeks of DecemberThere are actually six more forks on the Bitcoin blockchain allegedly on their way. Here are the forks in chronological order.3 min read·Dec 9, 2017--1--1
Kevin ChoiinChain Intelligence[TLDR Guide] Bitcoin Private Key, Public Key, and Public AddressA public-key cryptography (or asymmetrical cryptography) is one that uses pairs of keys: 1. public key (open to anyone); and 2. private key…2 min read·Nov 18, 2017--2--2