当前位置:网站首页>Principles of BTC cryptography
Principles of BTC cryptography
2022-07-03 05:09:00 【Adobee Chen】
The premise is to master the basic skills of programming : Array 、 Linked list 、 Binary tree 、 hash function
Reference material : BitCoin and Cryptocurrency Technologies A Comprehensive Introduction、 Ethereum white paper 、 Yellow book 、 Source code 、Solidty file
Used in cryptography hash The function is called Cryptographic hash function, There are two important properties. One is called Collision resistance
for example x
y ,H(x)=H(y) It's called hash collision ( Different inputs , The output is the same )
1. For cryptography hash Functions cannot be artificially made hash Collision
2. For cryptography hash The function is unidirectional , irreversible
For example
When one predicts the limit of the stock market tomorrow , It cannot be disclosed in advance . Because if this person may guide the direction of the rise and fall of the stock market ( Everyone heard him say which stock will rise tomorrow , Everyone buys that stock ), The best way is for him to write the forecast on a piece of paper , Give this piece of paper to the public trust institution .
Corresponding to the digital world , That's what this is x, Conduct hash(x). Wait until the opening tomorrow , To use this x Judge . because hash(x) It's irreversible , He cannot tamper with the result
边栏推荐
- Handler understands the record
- Redis 过期淘汰机制
- Literature reading_ Research on the usefulness identification of tourism online comments based on semantic fusion of multimodal data (Chinese Literature)
- [backtrader source code analysis 5] rewrite several time number conversion functions in utils with Python
- [research materials] the fourth quarter report of the survey of Chinese small and micro entrepreneurs in 2021 - Download attached
- Introduction to deep learning (II) -- univariate linear regression
- Class loading mechanism (detailed explanation of the whole process)
- JS dynamic table creation
- Use posture of sudo right raising vulnerability in actual combat (cve-2021-3156)
- Without 50W bride price, my girlfriend was forcibly dragged away. What should I do
猜你喜欢

appium1.22.x 版本后的 appium inspector 需单独安装

Audio Focus Series: write a demo to understand audio focus and audiomananger

Thesis reading_ Chinese medical model_ eHealth

Oracle SQL table data loss

Handler understands the record
![[basic grammar] C language uses for loop to print Pentagram](/img/9e/021c6c0e748e0981d4233f74c83e76.jpg)
[basic grammar] C language uses for loop to print Pentagram

Use posture of sudo right raising vulnerability in actual combat (cve-2021-3156)

Detailed explanation of the output end (head) of yolov5 | CSDN creation punch in

Detailed explanation of yolov5 training own data set

Shallow and first code
随机推荐
微服务常见面试题
Handler understands the record
Self introduction and objectives
【批处理DOS-CMD命令-汇总和小结】-CMD窗口的设置与操作命令-关闭cmd窗口、退出cmd环境(exit、exit /b、goto :eof)
[clock 223] [binary tree] [leetcode high frequency]: 102 Sequence traversal of binary tree
Do you know UVs in modeling?
Chapter II program design of circular structure
Yolov5 model construction source code details | CSDN creation punch in
Basic knowledge of reflection (detailed explanation)
Rust基础入门之(基本类型)
RT thread flow notes I startup, schedule, thread
[basic grammar] C language uses for loop to print Pentagram
Introduction to deep learning - definition Introduction (I)
1094 the largest generation (25 points)
Source insight garbled code solution
Flutter monitors volume to realize waveform visualization of audio
study hard and make progress every day
Learn to use the idea breakpoint debugging tool
Notes | numpy-07 Slice and index
JDBC database operation