Skip links


Safire Cryptography


Safire Cryptography – Blog Post #4 Safire uses the ECDSA Algorithm for generating public private keys to sign and validate ownership of funds and ensure transactions can only be initiated by the true owner. Safire also uses the Sha256  one way hashing algorithm to form keys and generate unique signatures of records and blocks in […]