* Detailed review and documentation of the analysis of cryptographic hashing and encryption algorithms used in cryptonote and other blockchain technologies to ascertain the fundamental principles and mathematical primitives
- So far the list includes Rijndael (AES), SHA2, Graestl, Blake256, Chacga8, Keccac and more
+ - From Asymmetric Cryptography comes RSA, DSA, Diffie-Helmann
+ and Elliptic Curve
- From these it is clear that the primitives involve Matrix Multiply
operations and Galois Field arithmetic, as well as ternary bitmanipulation
and Carry-capable Vector "long arithmetic".