Cryptocurrency
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the world of cryptocurrency in this 48-minute lecture covering a range of topics from attacking threshold wallets to the Cardano consensus layer. Dive into threshold signature schemes, the Golden Shoe setup and vulnerability, and learn about mitigating exploits. Discover the intricacies of distributed computation over networks and how theory interplays with practical implementation in blockchain technology. Examine block-fetch mechanisms, forecasting, and denial of service prevention. Investigate randomness beacons, their important parameters, and constructions like Verifiable Random Functions (VRF) and Threshold VRFs. Conclude with an introduction to lock puzzles and Verifiable Delay Functions, gaining a comprehensive understanding of cutting-edge cryptocurrency concepts and security measures.
Syllabus
Intro
Attacking Threshold Wallets
Threshold signature schemes TSST
Forget & Forgive Setup
Golden Shoe Setup
Golden Shoe Vulnerability
Golden Shoe Exploit
Golden Shoe Mitigation
Takeaways
From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
Overview
Distributed Computation over a Netwo
Consensus Layer of Cardano
Theory + Practice Interplay
Connecting theory with implementation
Block-Fetch, Forecasting, Denial of Service
What are Randomness Beacons?
Important Beacon Parameters
Constructions: Verifiable Random Functic (VRF)
Constructions: Threshold VRFs
Lock Puzzles and Verifiable Delay Functions
Taught by
TheIACR
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight