YoVDO

Cryptocurrency

Offered By: TheIACR via YouTube

Tags

Cryptocurrency Courses Network Security Courses Vulnerability Analysis Courses

Course Description

Overview

Explore the world of cryptocurrency in this 48-minute lecture covering a range of topics from attacking threshold wallets to the Cardano consensus layer. Dive into threshold signature schemes, the Golden Shoe setup and vulnerability, and learn about mitigating exploits. Discover the intricacies of distributed computation over networks and how theory interplays with practical implementation in blockchain technology. Examine block-fetch mechanisms, forecasting, and denial of service prevention. Investigate randomness beacons, their important parameters, and constructions like Verifiable Random Functions (VRF) and Threshold VRFs. Conclude with an introduction to lock puzzles and Verifiable Delay Functions, gaining a comprehensive understanding of cutting-edge cryptocurrency concepts and security measures.

Syllabus

Intro
Attacking Threshold Wallets
Threshold signature schemes TSST
Forget & Forgive Setup
Golden Shoe Setup
Golden Shoe Vulnerability
Golden Shoe Exploit
Golden Shoe Mitigation
Takeaways
From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
Overview
Distributed Computation over a Netwo
Consensus Layer of Cardano
Theory + Practice Interplay
Connecting theory with implementation
Block-Fetch, Forecasting, Denial of Service
What are Randomness Beacons?
Important Beacon Parameters
Constructions: Verifiable Random Functic (VRF)
Constructions: Threshold VRFs
Lock Puzzles and Verifiable Delay Functions


Taught by

TheIACR

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity