Cryptocurrency
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the world of cryptocurrency in this 48-minute lecture covering a range of topics from attacking threshold wallets to the Cardano consensus layer. Dive into threshold signature schemes, the Golden Shoe setup and vulnerability, and learn about mitigating exploits. Discover the intricacies of distributed computation over networks and how theory interplays with practical implementation in blockchain technology. Examine block-fetch mechanisms, forecasting, and denial of service prevention. Investigate randomness beacons, their important parameters, and constructions like Verifiable Random Functions (VRF) and Threshold VRFs. Conclude with an introduction to lock puzzles and Verifiable Delay Functions, gaining a comprehensive understanding of cutting-edge cryptocurrency concepts and security measures.
Syllabus
Intro
Attacking Threshold Wallets
Threshold signature schemes TSST
Forget & Forgive Setup
Golden Shoe Setup
Golden Shoe Vulnerability
Golden Shoe Exploit
Golden Shoe Mitigation
Takeaways
From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
Overview
Distributed Computation over a Netwo
Consensus Layer of Cardano
Theory + Practice Interplay
Connecting theory with implementation
Block-Fetch, Forecasting, Denial of Service
What are Randomness Beacons?
Important Beacon Parameters
Constructions: Verifiable Random Functic (VRF)
Constructions: Threshold VRFs
Lock Puzzles and Verifiable Delay Functions
Taught by
TheIACR
Related Courses
Правовое регулирование отношений в Интернете. Российская перспективаSaint Petersburg State University via Coursera La Disrupción del Blockchain
Universidad Austral via Coursera Introduction to FinTech
The University of Hong Kong via edX Bitcoin and Cryptocurrencies
University of California, Berkeley via edX Blockchain: Understanding Its Uses and Implications
Linux Foundation via edX