What are cross-chain bridges?
An explainer on cross-chain bridges, how they work and why they matter for DeFi.
What are cross-chain bridges?
An explainer on cross-chain bridges, how they work and why they matter for DeFi.
What is Taproot?
Taproot—Bitcoin’s BIP-340/341 upgrade—combines Schnorr signatures with a Merkle-based script tree to make complex contracts resemble simple single-key spends, improving privacy and efficiency while freeing block space. It builds on MAST concepts without burdening ordinary transactions.
What is ECDSA in Bitcoin?
1 What is ECDSA? ECDSA (short for Elliptic Curve Digital Signature Algorithm) is a scheme based on elliptic-curve cryptography (ECC). The ECDSA algorithm uses an elliptic curve and a finite field to create signatures that anyone can verify while only the signer can produce them. In Bitcoin, the signed data are transactions that transfer ownership.
What is sharding?
1 What is sharding? Sharding is a method of splitting and storing a single logical dataset across multiple databases, also known as horizontal partitioning. 2 When was sharding invented, and by whom? The concept has been used in centralised database management since the late 1990s. The term “shard” gained traction thanks to one of the first MMORPGs, Ultima Online, which spread players across servers to handle traffic.
What is a multisignature? What is a ring signature?
1 What is a multisignature? A multisignature (multisignature or multisig) is a technique for authorising transactions with multiple private keys to improve security and privacy. It is a type of threshold signature implemented through conditions in a cryptocurrency’s scripting language. 2 How and when did multisignatures emerge? Although widely used in cryptocurrencies, the underlying principles long predate bitcoin.
What is cryptography? Who are the cypherpunks?
1 What is cryptography? Cryptography is the science of methods that ensure data authentication, integrity and confidentiality. 2 When did cryptography emerge and how did it evolve? As a technique for protecting text, it arose alongside writing—methods of secret writing were known in ancient India, Mesopotamia and Egypt. In the first period of development (roughly from the third millennium BC to the ninth century) monoalphabetic ciphers predominated […].
What is ProgPoW?
ProgPoW—short for Programmatic Proof‑of‑Work—is an updated Ethash variant designed to improve CPU/GPU mining and blunt ASIC dominance. Created in 2018 by the ifdefelse team, it randomises workloads to favour GPUs; the proposal has sparked years of debate, audits and shifting decisions within Ethereum, including polls, petitions and concerns over governance.
How to launch your own cryptocurrency (token) and which blockchain to choose?
Is it possible to launch your own cryptocurrency? Yes, via two routes: build a new blockchain or issue a token on an existing one. This guide focuses on the latter, with step‑by‑step primers for Ethereum, Waves, EOS, the XRP Ledger and TRON. Note: the article is outdated and awaiting an update.
What are Ricardian contracts?
1 What are Ricardian contracts? A Ricardian contract is a legally binding digital agreement, cryptographically signed and verified, that sets the terms between two or more parties and is readable by both humans and machines. 2 Who created Ricardian contracts, and when? Creator: financial cryptographer Ian Grigg. Date: In 1995 Grigg proposed the “Ricardo” payment system, a potential use case for Ricardian contracts.
What is a 51% attack?
1 What is a 51% attack? A 51% attack is a vulnerability of PoW blockchains that lets an attacker control transaction confirmation and block production. 2 What does controlling 51% of a network’s power enable? Attackers can hinder block discovery (selfish mining), perform double spends against service providers and exchanges, fork the main chain, block confirmations, and collect all rewards and fees during the attack.
What is MimbleWimble?
1 What is MimbleWimble? A PoW protocol offering broad scalability and enhanced privacy; in the Harry Potter novels it is the "tongue-tying curse", hinting at concealed transaction data. 2 Who created it and when? An individual or group using the pseudonym "Tom Elvis Jedusor"; a white paper appeared on July 19, 2016, followed by Andrew Poelstra’s review in October and an early Grin implementation soon after.
What is Delegated Proof of Stake—and what does staking have to do with it?
1 What is the difference between PoS and DPoS? Attention! This article is outdated and awaiting an update. Delegated Proof of Stake (or DPoS) is a consensus algorithm created by developer Dan Larimer in 2014. Notable projects using DPoS: BitShares, Steemit, Lisk, Ark, EOS. PoS resembles direct democracy, whereas DPoS resembles representative democracy. Classic PoS allows coin holders to stake. A holder validates transactions and receives new coins as a reward.We use cookies to improve the quality of our service.
By using this website, you agree to the Privacy policy.