[Lecture 3] Fall 2018 Blockchain Fundamentals: Bitcoin Mechanics and Optimizations

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

Very good and instructive, I wish we could hear the questions better.

antdqs
Автор

5:33 Continues after break with Sigs, ECDSA, And Addresses
1:21:30 MultiSig

MartinThoma
Автор

I forgot but I remember I read some article explaining why BTC use SHA256^2, there was a reason. I will post later if I can find it again.

kevingzhang
Автор

"...relies on pre-image resistance and so is not vulnerable to birthday attacks, a generic method of hardening SHA1 against the birthday collision attack is to iterate it twice. A comparable attack on SHA256 does not exist so far, however as the design of SHA256 is similar to SHA1 it is probably defensive for applications to use double SHA256"

ericdean
Автор

29:22, when i heard this sentence, i just thought to myself computational language is so weird

musicminded