Privat: Cryptography for Blockchain Technology
Chapter 1: Introduction
5 Themen
What to expect?
Decentralized Money
Banking
The Blockchain
Decentralizing the Blockchain
Chapter 2: Cryptography
14 Themen
Hashing
Properties of Hash Functions
Current Hash Functions
SHA-256 as an example
Brute Force Attacks
The Birthday Paradox
Switching Hash Functions
Keyed Hash Functions
Symmetric Encryption
The Diffie-Hellman Key Exchange
Man in the Middle Attacks
Digital Signatures
Public Key Infrastructure
Digital Signatures with RSA
Chapter 3: Applications on the Blockchain
6 Themen
Transactions on the Blockchain
The SECP256K1-Standard
From Key to Address
Key Generation in Python
Brute Forcing Keys in Python
The Odds for the Brute Force Attack
Chapter 4: Mining - Proof of Work
12 Themen
Double Spending
Mining – Proof of Work
The Mining Algorithm
Soft Forks
Maliciously Produced Uncle Blocks
Mining Rewards
Mining Pools
P2Pool
Is Mining worth it?
Merkle Trees
Hashing Algorithms in PoW-Coins
Disadvantages of Proof of Work
Chapter 5: Privacy
11 Themen
Bitcoin is not anonymous
Short Introduction to Tor
Tor under attack
Simplified Payment Verfication Clients
Bloom Filter
Mixer
Coinjoin
Ring Signatures
Pedersen Commitments
The Maths Behind Pedersen
Zero-knowledge Proofs
Final Exam: Cryptography for Blockchain Technology (incl. Participation Certificate)
Kategorie
Beginner
Bitcoin
Blockchain
Ethereum
Kryptowährungen
Campus
Frankfurt School
BTC-ECHO
0% Complete
0/54 Steps
Previous Thema
Next Thema
Decentralized Money
Privat: Cryptography for Blockchain Technology
Chapter 1: Introduction
Decentralized Money
Lektion Progress
0% Complete
Previous Thema
Back to Lektion
Next Thema
Login
Accessing this course requires a login, please enter your credentials below!
Benutzername oder E-Mail-Adresse
Passwort
Angemeldet bleiben
Lost Your Password?
Register
Don't have an account? Register one!
Register an Account