当前位置:网站首页>Principles of BTC cryptography
Principles of BTC cryptography
2022-07-03 05:09:00 【Adobee Chen】
The premise is to master the basic skills of programming : Array 、 Linked list 、 Binary tree 、 hash function
Reference material : BitCoin and Cryptocurrency Technologies A Comprehensive Introduction、 Ethereum white paper 、 Yellow book 、 Source code 、Solidty file
Used in cryptography hash The function is called Cryptographic hash function, There are two important properties. One is called Collision resistance
for example xy ,H(x)=H(y) It's called hash collision ( Different inputs , The output is the same )
1. For cryptography hash Functions cannot be artificially made hash Collision
2. For cryptography hash The function is unidirectional , irreversible
For example
When one predicts the limit of the stock market tomorrow , It cannot be disclosed in advance . Because if this person may guide the direction of the rise and fall of the stock market ( Everyone heard him say which stock will rise tomorrow , Everyone buys that stock ), The best way is for him to write the forecast on a piece of paper , Give this piece of paper to the public trust institution .
Corresponding to the digital world , That's what this is x, Conduct hash(x). Wait until the opening tomorrow , To use this x Judge . because hash(x) It's irreversible , He cannot tamper with the result
边栏推荐
- Retirement plan fails, 64 year old programmer starts work again
- [basic grammar] C language uses for loop to print Pentagram
- 微服务常见面试题
- Market status and development prospect prediction of global SoC Test Platform Industry in 2022
- Thesis reading_ ICD code_ MSMN
- Handler understands the record
- Caijing 365 stock internal reference: what's the mystery behind the good father-in-law paying back 50 million?
- Messy change of mouse style in win system
- (完美解决)matplotlib图例(legend)如何自由设置其位置
- Notes | numpy-11 Array operation
猜你喜欢
Source insight garbled code solution
Keepalived热备与HAProxy
JQ style, element operation, effect, filtering method and transformation, event object
Prepare for 2022 and welcome the "golden three silver four". The "summary of Android intermediate and advanced interview questions in 2022" is fresh, so that your big factory interview can go smoothly
Thesis reading_ Chinese medical model_ eHealth
Shuttle + Alluxio 加速内存Shuffle起飞
[set theory] relational power operation (relational power operation | examples of relational power operation | properties of relational power operation)
leetcode435. Non overlapping interval
[research materials] 2021 annual report on mergers and acquisitions in the property management industry - Download attached
The programmer resigned and was sentenced to 10 months for deleting the code. JD came home and said that it took 30000 to restore the database. Netizen: This is really a revenge
随机推荐
Retirement plan fails, 64 year old programmer starts work again
Handler understands the record
[Yu Yue education] basic reference materials of interchangeability and measurement technology of Zhongyuan Institute of Technology
音频焦点系列:手写一个demo理解音频焦点与AudioMananger
Compile and decompile GCC common instructions
Hire cashier (differential constraint)
50 practical applications of R language (36) - data visualization from basic to advanced
[clock 223] [binary tree] [leetcode high frequency]: 102 Sequence traversal of binary tree
1103 integer factorization (30 points)
Thesis reading_ Chinese NLP_ ELECTRA
leetcode406. Rebuild the queue based on height
[research materials] 2022q1 game preferred casual game distribution circular - Download attached
Automatic voltage rise and fall 5-40v multi string super capacitor charging chip and solution
Thesis reading_ Chinese medical model_ eHealth
Make your own dataset
Self introduction and objectives
Celebrate the new year together
Gbase8s unique index and non unique index
Notes | numpy-08 Advanced index
"Pthread.h" not found problem encountered in compiling GCC