Hashes bytes value with blake2b algorithm
Hashes bytes value with keccak algorithm
Hashes bytes value with sha256 algorithm
Hashes bytes value with sha3 algorithm
Hashes bytes value with sha512 algorithm
An asymetric signature pattern allows the off-chain signing of some data with the the secret key, and check on-chain the identity of the signer with its public key.
Checks if signature and data matches
A timelocked value is encrypted strongly enough so that it will take more than a certain amount of time to crack it with a powerful computer, but weakly enough so that given some more time, this computer will manage to crack it. That is to say that, beyond a certain amount of time, a timelocked value may be considered public.
Learn more with this contract example.
Decrypt chest data
Sapling allows anonymity when transacting with fungible tokens.
Sapling requires a set of additional keys, similar to the public and private keys of your Tezos blockchain wallet. There is the viewing key and sending key. The viewing key is similar to the public key, where it allows you to see private transactions sent in and out. more ...
Elliptic curves provide a fast and efficient asymetric encryption pattern.
Checks pairing of pairs of BLS values