Cryptographic essence of #bitcoin: Part 2 — How do public/private keys work?,
▻https://hackernoon.com/cryptographic-essence-of-bitcoin-part-2-how-do-public-private-keys-work-
Cryptographic essence of Bitcoin: Part 2 — How do public/private keys work?, Elliptical #cryptography & Proof of workLet’s find out how to create a Bitcoin AddressElliptic Curves CryptographyElliptic curve cryptography (ECC) is an approach to public-key cryptography (watch video) based on the algebraic structure of elliptic curves over finite fields.The elliptic curve below is an example of an elliptic curve, similar to that used by bitcoin.Example of an EllipticCurveThe elliptic curve technique is used to create the public key derived from the private key.How does it work:Starting with a private key in the form of a randomly generated number k, we multiply it by a predetermined point on the curve called the generator point G to produce another point somewhere else on the curve, which is the (...)