-
Урок 1. 00:02:33Introduction
-
Урок 2. 00:05:45What is the motivation behind blockchains?
-
Урок 3. 00:06:56Data structure behind blockchains
-
Урок 4. 00:07:39SHA256 hashing algorithm
-
Урок 5. 00:08:46SHA256 hashing algorithm example
-
Урок 6. 00:09:40Decentralized ledgers
-
Урок 7. 00:08:29Blockchain mining #1
-
Урок 8. 00:09:11Blockchain mining #2
-
Урок 9. 00:02:00Consensus protocol
-
Урок 10. 00:05:53Byzantine generals problem
-
Урок 11. 00:05:05What is proof-of-work (PoW)?
-
Урок 12. 00:08:16What is proof-of-stake (PoS)?
-
Урок 13. 00:04:28Decentralized and distributed networks
-
Урок 14. 00:05:46Blockchain implementation I
-
Урок 15. 00:05:41Blockchain implementation II
-
Урок 16. 00:07:36Blockchain implementation III
-
Урок 17. 00:05:04Blockchain implementation IV
-
Урок 18. 00:07:55Blockchain implementation V
-
Урок 19. 00:06:44Blockchain implementation VI
-
Урок 20. 00:04:11Cryptocurrency motivation
-
Урок 21. 00:04:56Cryptocurrency policies
-
Урок 22. 00:07:08Mempools
-
Урок 23. 00:04:18Mempools example
-
Урок 24. 00:07:21Merkle-tree motivation
-
Урок 25. 00:06:57Merkle-tree implementation
-
Урок 26. 00:05:23PublicKey and PrivateKey
-
Урок 27. 00:05:05UTXOs
-
Урок 28. 00:03:14Wallets
-
Урок 29. 00:06:1751% attack
-
Урок 30. 00:05:47Orphaned blocks and block verification
-
Урок 31. 00:02:22Who pays the miners exactly?
-
Урок 32. 00:07:13What is a fork?
-
Урок 33. 00:01:40Cryptocurrency implementation I
-
Урок 34. 00:07:46Cryptocurrency implementation II
-
Урок 35. 00:01:37Cryptocurrency implementation III
-
Урок 36. 00:04:10Cryptocurrency implementation IV
-
Урок 37. 00:08:29Cryptocurrency implementation V
-
Урок 38. 00:06:48Cryptocurrency implementation VI
-
Урок 39. 00:03:27Cryptocurrency implementation VII
-
Урок 40. 00:03:30Cryptocurrency implementation VIII
-
Урок 41. 00:03:20Bitcoin
-
Урок 42. 00:05:31Altcoins and ICOs
-
Урок 43. 00:07:04Ethereum
-
Урок 44. 00:03:31Ethereum and the DAO attack
-
Урок 45. 00:11:53Cardano
-
Урок 46. 00:05:36LiteCoin
-
Урок 47. 00:09:54Dash
-
Урок 48. 00:02:50Why do we need elliptic curve cryptography?
-
Урок 49. 00:04:20What are elliptic curves?
-
Урок 50. 00:14:03Point addition and point doubling
-
Урок 51. 00:04:31Double and add algorithm
-
Урок 52. 00:03:35Elliptic curve discrete logarithm problem
-
Урок 53. 00:05:49Elliptic curve based Diffie-Hellman key exchange algorithm
-
Урок 54. 00:10:45Digital signatures with elliptic curves
-
Урок 55. 00:03:13RSA and elliptic curve cryptography
-
Урок 56. 00:08:13Elliptic curve cryptography (ECC) implementation I
-
Урок 57. 00:04:47Elliptic curve cryptography (ECC) implementation II
-
Урок 58. 00:04:31Elliptic curve cryptography (ECC) implementation III
- Категории
- Источники
- Все курсы
- Разделы
- Книги