-
[Learning Resources] CryptocurrencyLearning Resources 2021. 9. 26. 09:12반응형
Articles
1978
A method for obtaining digital signatures and public-key cryptosystems
Time, clocks, and the ordering of events in a distributed system
1979 – Invention of Merkle Trees (hashes in a tree structure) by Ralph C. Merkle
1980
Reaching agreement in the presence of faults
1982
https://www.microsoft.com/en-us/research/publication/byzantine-generals-problem/
Blind signatures for untraceable payments
Impossibility of distributed consensus with one faulty process
1983
A Public-key Cryptosystem Suitable for Digital Multisignatures
1985 – Work on elliptic curve cryptography by Neal Koblitz and Victor Miller
1986
Easy impossibility proofs for distributed consensus problems
1988
Consensus in the presence of partial synchrony
1989
1990
Implementing fault-tolerant services using the state machine approach: A tutorial
1991
Haber and Stornetta work on tamper proofing document timestamps. This can be considered the earliest idea of a chain of blocks or hash chains
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
How To Time-Stamp a Digital Document
1992 – Cynthia Dwork and Moni Naor publish Pricing via Processing or Combatting Junk Mail. This is considered the first use of Proof of Work (PoW)
1998
The part-time parliament (Paxos)
Financial Cryptography in 7 Layers
1999
http://pmg.csail.mit.edu/papers/osdi99.pdf
2001
2002
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
2006
2008
Efficient non-interactive proof systems for bilinear groups
2009
Bitcoin: A Peer-to-Peer Electronic Cash System
2010
Recommended Elliptic Curve Domain Parameters
An Overview of the Legal Knowledge Interchange Format
2011
Byzantizing Paxos by refinement
2013
Quadratic span programs and succinct NIZKs without PCPs
Secure High-Rate Transaction Processing in Bitcoin
https://bitcoinmagazine.com/technical/deterministic-wallets-advantages-flaw-1385450276
https://bitcoinmagazine.com/technical/deterministic-wallets-advantages-flaw-1385450276
2014
Succinct non-interactive zero knowledge for a von Neumann architecture
Deanonymisation of clients in Bitcoin P2P network
https://blog.ethereum.org/2014/05/06/daos-dacs-das-and-more-an-incomplete-terminology-guide/
2015
The General Theory of Decentralized Applications, DApps
Blindcoin: Blinded, accountable mixes for bitcoin
The bitcoin backbone protocol: Analysis and applications
Augur: a decentralized oracle and prediction market platform
https://www.provenance.org/whitepaper
2016
AsicBoost A Speedup for Bitcoin Mining
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
Smart Contract Templates: essential requirements and design options
https://lightning.network/lightning-network-paper.pdf
https://blog.kaiko.com/an-in-depth-guide-into-how-the-mempool-works-c758b781c608
2017
Bitcoin’s Security Model Revisited
Dandelion: Redesigning the Bitcoin Network for Anonymity
Smart Contract Templates: foundations, design landscape and research directions
Casper the Friendly Finality Gadget
REM: Resource-Efficient Mining for Blockchains
https://medium.com/@VitalikButerin/the-meaning-of-decentralization-a0c92b76a274
https://hackernoon.com/this-time-is-different-part-2-what-bitcoin-really-is-ae58c69b3bf0
https://www.vijaypradeep.com/blog/2017-04-28-ethereums-memory-hardness-explained
https://blog.sia.tech/choosing-asics-for-sia-b318505b5b51
https://www.freecodecamp.org/news/smart-contracts-for-dummies-a1ba1e0b9575/
https://www.bloomberg.com/features/2017-the-ether-thief/
https://steemit.com/blockchain/@khaleelkazi/complete-guide-on-bitcoin-and-blockchain-forks
https://techcrunch.com/2017/05/23/wtf-is-an-ico/
2018
Scalable, transparent, and post-quantum secure computational integrity
Compact multi-signatures for smaller blockchains
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees
https://hackernoon.com/what-the-heck-is-an-ico-6f3736d5f5a
https://medium.com/@essentia1/why-the-web-3-0-matters-and-you-should-know-about-it-a5851d63c949
2019
HotStuff: BFT consensus with linearity and responsiveness
2020
2021
PEER TO PEER INSURANCE ON AN ETHEREUM BLOCKCHAIN
Websites
SafeCurves: choosing safe curves for elliptic-curve cryptography
https://www.blockchain.com/explorer
https://en.wikipedia.org/wiki/HyperLogLog
replay attack
https://www.multichain.com/developers/multisignature-transactions/
https://gobittest.appspot.com/PrivateKey
https://www.blockchain.com/charts
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5139
https://en.bitcoin.it/wiki/Stratum_mining_protocol
https://lightning.network/
https://en.bitcoin.it/wiki/Coinprism
https://www.youtube.com/watch?v=pKqdjaH1dRo
Articles on eCash History
Blind signatures for untraceable payments
http://www.weidai.com/bmoney.txt
Auditable, Anonymous Electronic Cash
Lectures
MIT MAS.S62 Cryptocurrency Engineering and Design, Spring 2018
https://www.coursera.org/learn/cryptocurrency
https://www.coursera.org/learn/crypto
Books
Mastering Bitcoin: Programming the Open Blockchain
(MPNR) Secure multi- party non-repudiation protocols and applications
Handbook of applied cryptography, CRC press
Statistics
반응형'Learning Resources' 카테고리의 다른 글
[Learning Resources] API Security (0) 2022.01.15 [Reading List] Articles on Containerization & Resource Scheduling (0) 2021.08.30 [Reading List] 데이터 엔지니어링 관련 논문 (Articles on tools for the Data Engineering) (0) 2020.11.23 [Reading List] Articles on Web Server Performance (0) 2020.11.23