The protocol uses elliptic curve cryptography for keys.
— Satoshi Nakamoto
Please Login to reply.
No replies yet.