Blockchain Platforms. Stijn Van Hijfte

Чтение книги онлайн.

Читать онлайн книгу Blockchain Platforms - Stijn Van Hijfte страница 2

Blockchain Platforms - Stijn Van Hijfte Synthesis Lectures on Computer Science

Скачать книгу

target="_blank" rel="nofollow" href="#ulink_7f1823ad-6c4c-5821-9de7-3c25a46b468d">1.6 Distributed Hash Table

       1.7 Decentralized vs. Distributed

       1.7.1 SHA-256

       1.8 Merkle Tree

       1.8.1 Merkle Patricia Tree

       1.8.2 Bloom Filters

       1.9 State Machine

       1.9.1 Turing Machine

       1.10 Elliptical Curve Cryptography

       1.11 Byzantine Generals Problem

       1.11.1 Double Spend Problem

       1.11.2 CAP Theorem

       1.11.3 SPECTRE and the Condorcet Paradox

       1.11.4 Fermat’s Little Theorem

       1.11.5 Pedersen Commitments

       1.11.6 Fungibility and Liveness

       1.11.7 Transaction and Settlement Finality

       1.11.8 Censorship Resistance

       1.11.9 Winternitz One-Time Signatures

       1.12 What Is Blockchain?

       1.12.1 Foundations

       1.12.2 Building “Blocks”

       1.12.3 Blockchain or Distributed Ledger?

       1.12.4 Blockchain Address

       1.12.5 Blockchain Wallet

       1.12.6 Node

       1.12.7 Mining

       1.12.8 Merge Mining

       1.13 Block Time

       1.14 The Consensus Protocol

       1.15 Round Robin

       1.16 Proof of Work

       1.17 Nakamoto Consensus

       1.18 Proof of Stake

       1.19 Delegated Proof of Stake

       1.20 Proof of Authority

       1.21 PBFT

       1.22 The Cuckoo Cycle

       1.23 DECOR+HOP

       1.24 GHOST—SPECTRE—PHANTOM

       1.25 Ethash Algorithm and Dagger Hashimoto

       1.26 Keccak256 / SHA3

       1.27 Other Protocols Used in Blockchain Platforms

       1.28 Nonce

       1.29 Blockchain Forks

       1.30 Sidechains

       1.31 Blockchain Execution Engine

       1.32 Serialization

       1.33 The Blockchain Technology Stack

       1.34 DAG—Directed Acyclic Graph

       1.34.1 MerkleDAG

       1.34.2 BlockDAG

       1.35 Blockchain-Specific Attacks

       1.35.1 Virtual Machines

       1.35.2 Smart Contracts

       1.35.3 Wallets

       1.35.4 Other Attacks

       2 Bitcoin

       2.1 How Does Bitcoin Work?

      

Скачать книгу