The protocol uses elliptic curve cryptography for keys.

— Satoshi Nakamoto

Reply to this note

Please Login to reply.

Discussion

No replies yet.