Public key cryptography
Email address *
What security assumption does elliptic curve cryptography (ECC) depend on?
1 point
Clear selection
How are Bitcoin addresses derived?
1 point
Clear selection
Which of the following types of cryptocurrency wallets is generally the most secure?
1 point
Clear selection
Is it a good idea to roll your own crypto?
1 point
Clear selection
Why do cryptographic signatures sign the hash of the message instead of the message itself? (select multiple)
1 point
Which of the following statements describes encryption?
1 point
Clear selection
What is "asymmetric" about asymmetric cryptography?
1 point
Clear selection
Submit
This form was created inside of Nakamoto. Report Abuse