Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Learn Blockchain Technology & Cryptocurrency in Java, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:02:33
    Introduction
  • Урок 2. 00:05:45
    What is the motivation behind blockchains?
  • Урок 3. 00:06:56
    Data structure behind blockchains
  • Урок 4. 00:07:39
    SHA256 hashing algorithm
  • Урок 5. 00:08:46
    SHA256 hashing algorithm example
  • Урок 6. 00:09:40
    Decentralized ledgers
  • Урок 7. 00:08:29
    Blockchain mining #1
  • Урок 8. 00:09:11
    Blockchain mining #2
  • Урок 9. 00:02:00
    Consensus protocol
  • Урок 10. 00:05:53
    Byzantine generals problem
  • Урок 11. 00:05:05
    What is proof-of-work (PoW)?
  • Урок 12. 00:08:16
    What is proof-of-stake (PoS)?
  • Урок 13. 00:04:28
    Decentralized and distributed networks
  • Урок 14. 00:05:46
    Blockchain implementation I
  • Урок 15. 00:05:41
    Blockchain implementation II
  • Урок 16. 00:07:36
    Blockchain implementation III
  • Урок 17. 00:05:04
    Blockchain implementation IV
  • Урок 18. 00:07:55
    Blockchain implementation V
  • Урок 19. 00:06:44
    Blockchain implementation VI
  • Урок 20. 00:04:11
    Cryptocurrency motivation
  • Урок 21. 00:04:56
    Cryptocurrency policies
  • Урок 22. 00:07:08
    Mempools
  • Урок 23. 00:04:18
    Mempools example
  • Урок 24. 00:07:21
    Merkle-tree motivation
  • Урок 25. 00:06:57
    Merkle-tree implementation
  • Урок 26. 00:05:23
    PublicKey and PrivateKey
  • Урок 27. 00:05:05
    UTXOs
  • Урок 28. 00:03:14
    Wallets
  • Урок 29. 00:06:17
    51% attack
  • Урок 30. 00:05:47
    Orphaned blocks and block verification
  • Урок 31. 00:02:22
    Who pays the miners exactly?
  • Урок 32. 00:07:13
    What is a fork?
  • Урок 33. 00:01:40
    Cryptocurrency implementation I
  • Урок 34. 00:07:46
    Cryptocurrency implementation II
  • Урок 35. 00:01:37
    Cryptocurrency implementation III
  • Урок 36. 00:04:10
    Cryptocurrency implementation IV
  • Урок 37. 00:08:29
    Cryptocurrency implementation V
  • Урок 38. 00:06:48
    Cryptocurrency implementation VI
  • Урок 39. 00:03:27
    Cryptocurrency implementation VII
  • Урок 40. 00:03:30
    Cryptocurrency implementation VIII
  • Урок 41. 00:03:20
    Bitcoin
  • Урок 42. 00:05:31
    Altcoins and ICOs
  • Урок 43. 00:07:04
    Ethereum
  • Урок 44. 00:03:31
    Ethereum and the DAO attack
  • Урок 45. 00:11:53
    Cardano
  • Урок 46. 00:05:36
    LiteCoin
  • Урок 47. 00:09:54
    Dash
  • Урок 48. 00:02:50
    Why do we need elliptic curve cryptography?
  • Урок 49. 00:04:20
    What are elliptic curves?
  • Урок 50. 00:14:03
    Point addition and point doubling
  • Урок 51. 00:04:31
    Double and add algorithm
  • Урок 52. 00:03:35
    Elliptic curve discrete logarithm problem
  • Урок 53. 00:05:49
    Elliptic curve based Diffie-Hellman key exchange algorithm
  • Урок 54. 00:10:45
    Digital signatures with elliptic curves
  • Урок 55. 00:03:13
    RSA and elliptic curve cryptography
  • Урок 56. 00:08:13
    Elliptic curve cryptography (ECC) implementation I
  • Урок 57. 00:04:47
    Elliptic curve cryptography (ECC) implementation II
  • Урок 58. 00:04:31
    Elliptic curve cryptography (ECC) implementation III