当前位置:网站首页>Principles of BTC cryptography
Principles of BTC cryptography
2022-07-03 05:09:00 【Adobee Chen】
The premise is to master the basic skills of programming : Array 、 Linked list 、 Binary tree 、 hash function
Reference material : BitCoin and Cryptocurrency Technologies A Comprehensive Introduction、 Ethereum white paper 、 Yellow book 、 Source code 、Solidty file
Used in cryptography hash The function is called Cryptographic hash function, There are two important properties. One is called Collision resistance
for example x
y ,H(x)=H(y) It's called hash collision ( Different inputs , The output is the same )
1. For cryptography hash Functions cannot be artificially made hash Collision
2. For cryptography hash The function is unidirectional , irreversible
For example
When one predicts the limit of the stock market tomorrow , It cannot be disclosed in advance . Because if this person may guide the direction of the rise and fall of the stock market ( Everyone heard him say which stock will rise tomorrow , Everyone buys that stock ), The best way is for him to write the forecast on a piece of paper , Give this piece of paper to the public trust institution .
Corresponding to the digital world , That's what this is x, Conduct hash(x). Wait until the opening tomorrow , To use this x Judge . because hash(x) It's irreversible , He cannot tamper with the result
边栏推荐
- [set theory] relation properties (reflexivity | reflexivity theorem | reflexivity | reflexivity theorem | example)
- Notes | numpy-07 Slice and index
- Silent authorization login and registration of wechat applet
- Thesis reading_ Chinese medical model_ eHealth
- JS dynamic table creation
- [set theory] relationship properties (common relationship properties | relationship properties examples | relationship operation properties)
- [develop wechat applet local storage with uni app]
- Market status and development prospect prediction of the global autonomous hybrid underwater glider industry in 2022
- (完美解决)matplotlib图例(legend)如何自由设置其位置
- [set theory] relational power operation (relational power operation | examples of relational power operation | properties of relational power operation)
猜你喜欢

Ueditor, FCKeditor, kindeditor editor vulnerability

"Hands on deep learning" pytorch edition Chapter II exercise

Gbase8s composite index (I)

Handler understands the record

【实战项目】自主web服务器

es7创建索引容易犯的错误

Esp32-c3 learning and testing WiFi (II. Wi Fi distribution - smart_config mode and BlueIf mode)

Without 50W bride price, my girlfriend was forcibly dragged away. What should I do
![[basic grammar] C language uses for loop to print Pentagram](/img/9e/021c6c0e748e0981d4233f74c83e76.jpg)
[basic grammar] C language uses for loop to print Pentagram
![[research materials] 2022q1 game preferred casual game distribution circular - Download attached](/img/13/5a67c5d08131745759fdc70a71cf0f.jpg)
[research materials] 2022q1 game preferred casual game distribution circular - Download attached
随机推荐
音频焦点系列:手写一个demo理解音频焦点与AudioMananger
cookie session jwt
The process of browser accessing the website
Caijing 365 stock internal reference: what's the mystery behind the good father-in-law paying back 50 million?
Online VR model display - 3D visual display solution
Go language interface learning notes
Basic knowledge of reflection (detailed explanation)
leetcode452. Detonate the balloon with the minimum number of arrows
How to connect the network: Chapter 1 CSDN creation punch in
Burp suite plug-in based on actual combat uses tips
1110 complete binary tree (25 points)
@RequestMapping
Realize file download through the tag of < a > and customize the file name
【实战项目】自主web服务器
study hard and make progress every day
1106 lowest price in supply chain (25 points)
[research materials] annual report of China's pension market in 2021 - Download attached
JS string and array methods
Unity tool Luban learning notes 1
Common methods of JS array