Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Learn Blockchain Technology & Cryptocurrency in Java, а также все другие курсы, прямо сейчас!
Премиум
  1. Урок 1. 00:02:33
    Introduction
  2. Урок 2. 00:05:45
    What is the motivation behind blockchains?
  3. Урок 3. 00:06:56
    Data structure behind blockchains
  4. Урок 4. 00:07:39
    SHA256 hashing algorithm
  5. Урок 5. 00:08:46
    SHA256 hashing algorithm example
  6. Урок 6. 00:09:40
    Decentralized ledgers
  7. Урок 7. 00:08:29
    Blockchain mining #1
  8. Урок 8. 00:09:11
    Blockchain mining #2
  9. Урок 9. 00:02:00
    Consensus protocol
  10. Урок 10. 00:05:53
    Byzantine generals problem
  11. Урок 11. 00:05:05
    What is proof-of-work (PoW)?
  12. Урок 12. 00:08:16
    What is proof-of-stake (PoS)?
  13. Урок 13. 00:04:28
    Decentralized and distributed networks
  14. Урок 14. 00:05:46
    Blockchain implementation I
  15. Урок 15. 00:05:41
    Blockchain implementation II
  16. Урок 16. 00:07:36
    Blockchain implementation III
  17. Урок 17. 00:05:04
    Blockchain implementation IV
  18. Урок 18. 00:07:55
    Blockchain implementation V
  19. Урок 19. 00:06:44
    Blockchain implementation VI
  20. Урок 20. 00:04:11
    Cryptocurrency motivation
  21. Урок 21. 00:04:56
    Cryptocurrency policies
  22. Урок 22. 00:07:08
    Mempools
  23. Урок 23. 00:04:18
    Mempools example
  24. Урок 24. 00:07:21
    Merkle-tree motivation
  25. Урок 25. 00:06:57
    Merkle-tree implementation
  26. Урок 26. 00:05:23
    PublicKey and PrivateKey
  27. Урок 27. 00:05:05
    UTXOs
  28. Урок 28. 00:03:14
    Wallets
  29. Урок 29. 00:06:17
    51% attack
  30. Урок 30. 00:05:47
    Orphaned blocks and block verification
  31. Урок 31. 00:02:22
    Who pays the miners exactly?
  32. Урок 32. 00:07:13
    What is a fork?
  33. Урок 33. 00:01:40
    Cryptocurrency implementation I
  34. Урок 34. 00:07:46
    Cryptocurrency implementation II
  35. Урок 35. 00:01:37
    Cryptocurrency implementation III
  36. Урок 36. 00:04:10
    Cryptocurrency implementation IV
  37. Урок 37. 00:08:29
    Cryptocurrency implementation V
  38. Урок 38. 00:06:48
    Cryptocurrency implementation VI
  39. Урок 39. 00:03:27
    Cryptocurrency implementation VII
  40. Урок 40. 00:03:30
    Cryptocurrency implementation VIII
  41. Урок 41. 00:03:20
    Bitcoin
  42. Урок 42. 00:05:31
    Altcoins and ICOs
  43. Урок 43. 00:07:04
    Ethereum
  44. Урок 44. 00:03:31
    Ethereum and the DAO attack
  45. Урок 45. 00:11:53
    Cardano
  46. Урок 46. 00:05:36
    LiteCoin
  47. Урок 47. 00:09:54
    Dash
  48. Урок 48. 00:02:50
    Why do we need elliptic curve cryptography?
  49. Урок 49. 00:04:20
    What are elliptic curves?
  50. Урок 50. 00:14:03
    Point addition and point doubling
  51. Урок 51. 00:04:31
    Double and add algorithm
  52. Урок 52. 00:03:35
    Elliptic curve discrete logarithm problem
  53. Урок 53. 00:05:49
    Elliptic curve based Diffie-Hellman key exchange algorithm
  54. Урок 54. 00:10:45
    Digital signatures with elliptic curves
  55. Урок 55. 00:03:13
    RSA and elliptic curve cryptography
  56. Урок 56. 00:08:13
    Elliptic curve cryptography (ECC) implementation I
  57. Урок 57. 00:04:47
    Elliptic curve cryptography (ECC) implementation II
  58. Урок 58. 00:04:31
    Elliptic curve cryptography (ECC) implementation III