Digital Peer-To-Peer Cryptocurrency

Total Page:16

File Type:pdf, Size:1020Kb

Digital Peer-To-Peer Cryptocurrency Bitcoin Digital peer-to-peer cryptocurrency Αλέξανδρος Αφεντούλ ς el0"#$0 %at& 'ail.ntua.gr Cryptography Bitcoin is heavily using crypto : ● Digital signatures – ECDSA is used, an elliptic curve variant of DSA ● Hashing – SHA-2 ! and R#PEMD-&!' are used #f we wanna make a distri+uted peer-to-peer currency with no central authority, we still have to trust so)eone... … let it be crypto. Digital signatures ● Digital signatures is an application of asy)metric cryptography ● $rove the authenticity (and integrity) of a piece of data. ● 1e use them every day in HTTPS, in soft(are packages and more. ● Alice owns some data. Creates a pair of pu+lic and private *ey. Digitally signs data with her private key. 3ives the data along with its digital signature to Bo+, ● Bo+ knows Alice's pu+lic key. Bo+ is able to verify that data is digitally signed +y Alice. Digital signatures Digital signatures & elliptic cur-e crypto ● #n Bitcoin, transactions are signed using ECDSA, i.e. elliptic curve DSA. ● Elliptic curve crypto is based on the difficulty of solving the discrete logarith) pro+lem over a certain elliptic curve. ● ECC's main advantage is considered to +e s)aller key si5e while )aintaining the same level of security with crypto +ased in pri)e factori5ation, ● Bitcoin is using Secp2 !*& elliptic curve, Has*ing ● Hashing functions take an arbitrary bloc* of data as input and return an output of fi6ed length. ● Have the following properties: – output is easily computed for any input – if input is slightly modified output will +e completely different – we can't (easily) find a collision, i.e. sa)e output for different inputs, ● Hashing functions are widely used in crypto, +ut also in other applications that require message integrity, ● Bitcoin uses SHA-2 ! (outputs 2 ! bits) and R#PEMD-&!' (outputs &!' bits0 /onetary problem+ Bitcoin -as any currency- has to solve some pro+lems : ● Dou+le-spending, Alice cannot send the same +itcoin to Bo+ and Charlie at the same time ● 8orgery, Alice cannot produce arbitrary amount of bitcoins, a hard pro+lem especially when currency is digital ● 9alidity of transactions, so)eone somehow has to guarantee the validity of the transactions, especially in a decentrali5ed network ● #nflation? Bitcoin ● #ntroduced by Satoshi Nakamoto back in 2''< with the relevant paper. Nakamoto also wrote an initial open source implementation of the idea in C++. ● Bitcoin is a protocol which enables the existence of distri+uted peer-to-peer digital currency. Transactions are almost free, al)ost instant and truly irreversi+le. ● Bitcoin is secured by cryptography ● Bitcoin is open source and nowadays developed +y a co))unity ● Has gained a lot attention +y a variety of people glo+ally ● Also, is now considered valuable... Bitcoin - ad1resses ● Bitcoin addresses can be seen as the “+ank account? of Alice. Alice's bitcoin address is where so)eone will send bitcoins to Alice. ● Alice can create arbitrary nu)+er of bitcoin addresses. Multiple +itcoin addresses consist a bitcoin wallet, ● Essentially bitcoin addresses correspond to the pu+lic part, of a pu+lic-private key pair. Alice creates such *ey pairs at will. ● A bitcoin address is in fact the hash of a ECDSA pu+lic key, Bitcoin - transactions ● A bitcoin transaction is a pu+lic stament that some +itcoins +elonging to Alice's bitcoin address are now belonging to Bo+'s +itcoin address, ● Every transaction is digitally signed with sender's private key, the pair of the pu+lic key which holds the coins, ● Every transaction is broadcasted through a network of peers, ● Each transaction will have to be validated by the so called 'miners4 (we'll talk later on about mining). 2ransactions are validated in a variable ti)e window of some minutes, ● 2ransactions are grouped in +locks, ● As long as a transaction is validated, it is part of the blockchain, Bitcoin - transactions Bitcoin – block+ & 0loc3chain ● %iners are trying to find bitcoin blocks which will include transactions waiting to be validated, ● A block contains an amount of bitcoin transactions which were at some point of ti)e validated, ● Every block, apart fro) transactions, contains a uni7ue identification of the previously found bloc*, ● Appro6imately every &' minutes a block is found, ● Thus a chain of +locks is created, the bloc*chain, Blockchain is essentially the complete history of every single transaction ever happened in the bitcoin net(ork . ● Blockchain is the serial binding of many +locks, Bitcoin - Mining ● %ining is the procedure of finding a bitcoin bloc*. ● %iners try to solve a hard proble), Finding a solution is hard but any solution can be instantly verified by the whole net(ork, ● %iner takes as input an amount of broadcasted transactions waiting to be validated and a unique identification of the last discovered bloc*, ● The problem is to find a hash of the above input with a specific nu)+er of leading '0'. The more zeros, the more difficult is the proble), Difficulty is adjusted by the net(ork, in order to have a solution every 10 minutes independently of the network's total hashrate. ● As long as a miner finds a solution, they broadcast it, network verifies it and the block is added to blockchain. Transactions in that block are then considered valid, ● Finding a solution serves as a proof of work. One has to spend resources and time to find a block. Remem+er a bloc* contains a part of bitcoin transaction's history. An adversary must have more than 50B of network's hashing rate to change the history (create another version of bloc*chain). Bitcoin – Mining & Rewar1+ ● %ining validates transactions and secures +itcoin, thus it4s very important, ● %ining is a resource e6pensive procedure, ● As an incentive to *eep )ining and *eep the net(or* sta+le, miners finding a +loc* are re(arded (ith an amount of +itcoins. ● Esentially, miner finding a +loc* is allo(ed to perfor) a special transaction, sending to himself a predefined amount of +itcoins out of no(here, ● 2hat4s ho( +itcoins are created, ● %ining re(ard is currently at 2 B2C, "e(ard is halving every 2&',''' +loc*s, so eventually only 2& million +tc can ever +e found ● 2his (as ta*en as )easure against inflation, "e)e)+er that in Bitcoin there is no central authority printing money, 2his is su+ject of an ongoing de+ate, ● %iners also get the fee for every transaction they include in a +loc*, Bitcoin & t*e general+6 problem ● Bitcoin is an elegant solution to the By5antine 3enerals' $ro+le) ● 2he proble) in +itcoin, is how can a net(or* of entities that don't trust each other )utually agree on a certain thing ● 2his thing that +itcoin peers agree on is the +loc*chain, the entire history of +itcoin transactions, ● Every peer has a local copy of the bloc*chain and needs to contantly update it (ith ne( transactions. 2hat4s essential in order to *no( how many coins each address has, ● Bitcoin )anages to solve the proble) +y introducing the proof of (or*, i.e, hashing /and +y )a*ing every transaction public0, ● Each )iner repeatedly hashes 7ueued transactions until they find a valid solution (hich (ill be +roadcasted, 2hen the (hole networ* agrees to re+ase their +loc*chain history (ith this +loc* included, Bitcoin 2 )lient+ ● A bitcoin client is needed to perfor) bitcoin transactions ● Start here : https://bitcoin.org ● 'Bitcoin core' is the original client, stable and secure, but harvest more resources since it downloads the whole bloc*chain ● Electrum is a light(eight client. Uses a set of re)ote servers (hich hold the entire bloc*chain. Still *eys are kept and transactions are created client-side. http://electru).orgC ● 1eb wallets must be avoided. Bitcoin gives the advantage of having your coins locally, there is no reason to give the) to the “cloud?, Bitcoin 2 7*at6s so great a0out it? ● $eers do not trust each other, yet are able to reach a consensus ● 2ransactions cannot be bloc*ed /e,g. banks, paypal, visa etc0 ● 2ransactions are almost instant, have very lo( fees, are independent of sender4sCreceiver4s location, contrary to ban*ing syste) ● Every peer has full control of its coins, no entity can “free5e” the) ● %ulti-signature addresses and transactions, 8unds can be transferred (hen n of ) *eys are used, ● 1e can create bitcoin keysCaddresses offline, then print the) on paper, *eeping the coins in “cold storage?, ● Bitcoin is not anony)ous, actually every transaction is public, Bitcoin can under certain conditions be )ore anony)ous than traditional banking, but certainly less anony)ous than cash, Please gim'e moar ● https:CCen.(ikipedia.orgC(ikiCElliptic_curve_cryptography ● http:CCblog.cloudflare.comCa-relatively-easy-to-understand-primer-on-elliptic-curv e-cryptography – d@+4s curve2 &< : http:CCcr,yp.toCecdh.html – agl4s curve2 &<-donna : https:CCgithu+,com/aglCcurve25519-donna ● https:CCen.(ikipedia.orgC(ikiCECDSA ● https:CCen.(ikipedia.orgC(ikiCSHA-2 ● https:CCen.+itcoin.itC(ikiCProtocol_specification ● https:CCgithub.com/bitcoin/+ips ● https:CCen.(ikipedia.orgC(ikiC2(o_Generals%27_Problem ● https:CCen.(ikipedia.orgC(ikiCBy5antine_fault_tolerance ● https:CCgithub.com/spes)ilo/electrum /client in python0 .
Recommended publications
  • The Unicode Standard, Version 6.3
    Currency Symbols Range: 20A0–20CF This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 6.3 This file may be changed at any time without notice to reflect errata or other updates to the Unicode Standard. See http://www.unicode.org/errata/ for an up-to-date list of errata. See http://www.unicode.org/charts/ for access to a complete list of the latest character code charts. See http://www.unicode.org/charts/PDF/Unicode-6.3/ for charts showing only the characters added in Unicode 6.3. See http://www.unicode.org/Public/6.3.0/charts/ for a complete archived file of character code charts for Unicode 6.3. Disclaimer These charts are provided as the online reference to the character contents of the Unicode Standard, Version 6.3 but do not provide all the information needed to fully support individual scripts using the Unicode Standard. For a complete understanding of the use of the characters contained in this file, please consult the appropriate sections of The Unicode Standard, Version 6.3, online at http://www.unicode.org/versions/Unicode6.3.0/, as well as Unicode Standard Annexes #9, #11, #14, #15, #24, #29, #31, #34, #38, #41, #42, #44, and #45, the other Unicode Technical Reports and Standards, and the Unicode Character Database, which are available online. See http://www.unicode.org/ucd/ and http://www.unicode.org/reports/ A thorough understanding of the information contained in these additional sources is required for a successful implementation.
    [Show full text]
  • 3Ffq Vdk Hf"*'Ll-,Tr E{-.-,Drri.Ld L2/11-130
    tso/rEc JTc l/sc 2JING2 PROPOSAL SUMMARY FORM TO ACCOMPANY SUBMISSIONS FOR ADDITIONS TO THE REPERTOIRE OF ISO/IEC 106461 Please fill all the sections A, B and C below. Please read Principles and Procedures Document (P & P) from htip:/lwww.dkuuq.dklJTCllSC2lWG2ldocslprirrcirrtes.htryl- for guidelines and details before filling this form. Please ensure you are using the latest Form from http:/lwww.dkuuq.dkJJTCllSC2lWG2ldcc-slsuqfigfflgjli11id. See also httn./lwww.dku 6. Choose one of the following: This is a complete proposal: (or) More information will be provided later: B. Technical - General 1. Choose one of the following: a. This proposal is for a new script (set of characters): ,<1 t:A Proposed name of script: -----------_/:_ b. The proposal is for addition of character(s) to an existing block: YPq Name of the existing btock: -_-C-UfU*n<_:4 -5-.1-,rrh-ol,S- _-____--- __--f-":"-____--___ 2.Numberofcharactersinproposal: I | --L- -----_ 3. Proposed category (select one from below - see section 2.2 of P&P document): A-Contemporary --\_ B.1-specialized (smallcollection) B.2-Specialized (large collection) C-Major extinct _____ D-Attested extinct E-Minor e)dinctextinct F-Archaic Hieroglyphic or ldeographi G-Obscure or questionable usage symbols 4. ls a repertoire including character names provided? _-y_t_l-_-__ _ _ -_ a. lf YES, are the names in accordance with the "character naming guidelines" t in Annex L of P&P document? __y_t--t-___-_____-_ b. Are the character shapes attached in a legible form suitable for review? llgS-" - 5.
    [Show full text]
  • Symbols & Glyphs 1
    Symbols & Glyphs Content Shortcut Category ← leftwards-arrow Arrows ↑ upwards-arrow Arrows → rightwards-arrow Arrows ↓ downwards-arrow Arrows ↔ left-right-arrow Arrows ↕ up-down-arrow Arrows ↖ north-west-arrow Arrows ↗ north-east-arrow Arrows ↘ south-east-arrow Arrows ↙ south-west-arrow Arrows ↚ leftwards-arrow-with-stroke Arrows ↛ rightwards-arrow-with-stroke Arrows ↜ leftwards-wave-arrow Arrows ↝ rightwards-wave-arrow Arrows ↞ leftwards-two-headed-arrow Arrows ↟ upwards-two-headed-arrow Arrows ↠ rightwards-two-headed-arrow Arrows ↡ downwards-two-headed-arrow Arrows ↢ leftwards-arrow-with-tail Arrows ↣ rightwards-arrow-with-tail Arrows ↤ leftwards-arrow-from-bar Arrows ↥ upwards-arrow-from-bar Arrows ↦ rightwards-arrow-from-bar Arrows ↧ downwards-arrow-from-bar Arrows ↨ up-down-arrow-with-base Arrows ↩ leftwards-arrow-with-hook Arrows ↪ rightwards-arrow-with-hook Arrows ↫ leftwards-arrow-with-loop Arrows ↬ rightwards-arrow-with-loop Arrows ↭ left-right-wave-arrow Arrows ↮ left-right-arrow-with-stroke Arrows ↯ downwards-zigzag-arrow Arrows 1 ↰ upwards-arrow-with-tip-leftwards Arrows ↱ upwards-arrow-with-tip-rightwards Arrows ↵ downwards-arrow-with-tip-leftwards Arrows ↳ downwards-arrow-with-tip-rightwards Arrows ↴ rightwards-arrow-with-corner-downwards Arrows ↵ downwards-arrow-with-corner-leftwards Arrows anticlockwise-top-semicircle-arrow Arrows clockwise-top-semicircle-arrow Arrows ↸ north-west-arrow-to-long-bar Arrows ↹ leftwards-arrow-to-bar-over-rightwards-arrow-to-bar Arrows ↺ anticlockwise-open-circle-arrow Arrows ↻ clockwise-open-circle-arrow
    [Show full text]
  • Vie De La Société Journal De La Société Statistique De Paris, Tome 48 (1907), P
    JOURNAL DE LA SOCIÉTÉ STATISTIQUE DE PARIS JSFS Vie de la société Journal de la société statistique de Paris, tome 48 (1907), p. 201-208 <http://www.numdam.org/item?id=JSFS_1907__48__201_0> © Société de statistique de Paris, 1907, tous droits réservés. L’accès aux archives de la revue « Journal de la société statistique de Paris » (http://publications-sfds.math.cnrs.fr/index.php/J-SFdS) implique l’accord avec les conditions générales d’utilisation (http://www.numdam.org/conditions). Toute uti- lisation commerciale ou impression systématique est constitutive d’une infrac- tion pénale. Toute copie ou impression de ce fichier doit contenir la pré- sente mention de copyright. Article numérisé dans le cadre du programme Numérisation de documents anciens mathématiques http://www.numdam.org/ JOURNAL SOCIETr EM DE STATISTIQUE DE PARIS No 7. — JUILLET 1907 I PROCÈS-VERBAL DE LÀ SÉANCE DU 19 JUIN 19Ô7 SOMMAIRE. — Adoption du procès-verbal de la séance du 15 mai 1907. — Nomination définitive de deux membres titulaires. — -Présentation d'un membre titulaire. — Présentation d'ouvrages Ï M. le Secrétaire général. — Communication de M. Tarry sur resperanto. — Communi­ cation de M. Limousin sur la statistique de la franc-maçonnerie dans le monde. — Communication de M. Desroys du Route sur les résultats pour les contribuables pari­ siens du nouveau projet d'impôt sur le revenu: discussion : MM. Neymarck, Laurent, Albert Fontaine. La séance est ouverle à 9 heures, sous la présidence de M. MARCH. Le procès-verbal de la séance du 15 mai est adopte. M. le PRÉSIDENT met aux voix l'élection définitive, comme membres titulaires, de MM.
    [Show full text]
  • The Unicode Standard, Version 6.0
    Currency Symbols Range: 20A0–20CF This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 6.0. This file may be changed at any time without notice to reflect errata or other updates to the Unicode Standard. See http://www.unicode.org/errata/ for an up-to-date list of errata. See http://www.unicode.org/charts/ for access to a complete list of the latest character code charts. See http://www.unicode.org/charts/PDF/Unicode-6.0/ for charts showing only the characters added in Unicode 6.0. See http://www.unicode.org/Public/6.0.0/charts/ for a complete archived file of character code charts for Unicode 6.0. Disclaimer These charts are provided as the online reference to the character contents of the Unicode Standard, Version 6.0 but do not provide all the information needed to fully support individual scripts using the Unicode Standard. For a complete understanding of the use of the characters contained in this file, please consult the appropriate sections of The Unicode Standard, Version 6.0, online at http://www.unicode.org/versions/Unicode6.0.0/, as well as Unicode Standard Annexes #9, #11, #14, #15, #24, #29, #31, #34, #38, #41, #42, and #44, the other Unicode Technical Reports and Standards, and the Unicode Character Database, which are available online. See http://www.unicode.org/ucd/ and http://www.unicode.org/reports/ A thorough understanding of the information contained in these additional sources is required for a successful implementation.
    [Show full text]
  • Caplliure Gramática 1933.Pdf
    plllllllllllllllll iiiiiiiiiiiiiiiiiiiiiiiiiiiiii !_!i.tiii_iiiiiiimii.e- _____ *_uiiimimi ESPERANTO IDIOMA AUXILIAR INTERNACIONAL POR Manuel Caplliure Ballester Maestro superior, Profesor diplomado por Internacia Insti- tuto de Esperanto, de Ginebra, Miembro de Hispana Esperanto Instituto, Profesor de esta asignatura en el lnstituto de Idiomas de la Univer- sidad de Valencia, Vic - Delegito de Universala Esperanto Asocio (U. E. A.) VALENCIA-1.33 Imprenta de Jose Olmos Calle de Castellon, 13 llllinil!IIHIIIIIIIII!lllll.lllllll!!!llllll!lllllhlll!l!llllllllll!llln : ! : : I i:i iM:'rMll.l-IJ^INiHhi:i|'||J!|MT!.l;i|i|-ll; IIil:|i:IIIIII:|.1.1!HIIMIhi:I:i|Mll1.1!;\:|111.1hUU'II'1111.IIM'i^ri!'hi:I!!iliIIIIIIl|.'lMl'llHIIIIIMI:MIi|HHMHMHIUII!IIIMI!MI'.|' /6xOOOO rr ESPERANTO Idioma auxiliar internacionai GRAMATICA, EJERCICIOS Y DICCIONARIO por Maestro superior, Profesor diplomado por Internacja Instituto _ de Lsperanto, de Ginebra, Miembro de Hispana Espe= ranto Instituto, Profesor de esta asignatura en el Instituto de Idiomas de la Universi- :=: dad de Valencia :=: ^Vnlen-zLi 1933 ES PROPIEDAD DEL AUTOR FUNDAM ENTA 6RAMATIK0 de la lingvo Esperanto de Doktoro L. L. Zamenhof _v., . , . > A. Alfabeto Aa, Bb, Cc, Ĉĉ, Dd, Ee, Ff, Gg, Ĝĝ, Hh, Ĥĥ, Ii, Jj, ĵĵ, Kk, Ll, Mm, Nn, Oo, Pp, Rr, Ss, Ŝŝ, Tt, Uu, Ŭŭ, Vv, Zz. Rimarko. Presejoj, kiuj ne posedas la liierojn ĉ, ĝ, ĥ, }, ŝ, ŭ, povas anstataŭ ili uzi ch, gh, hh, jh, sh, u. B. Reguloj 1. Hpiikolo nedifinita ne ekzistas; ekzistas nur artikolo difinita (la). egala por ĉiuj seksoj, kazoj kaj nombroj. ffimarko. La uzado de la artikolo estas tia sama, kia en ia aliaj lingvoj.
    [Show full text]
  • Internacia Kongresa Universitato, IKU En 2020
    Universala Esperanto-Asocio Universala Esperanto-Asocio Internacia Kongresa UniversitatoInternacia Tutmonde Kongresa73-a sesio 01 Universitato— 08 de aŭgusto 2020 Tutmonde 73-a sesio 01 — 08 de aŭgusto 2020 Internacia Kongresa Universitato. 73-a sesio Universitato. Kongresa Internacia Red.Red. Anna Anna Striganova, Striganova, Dmitrij Dmitrij Ŝevĉenko, Ŝevĉenko, Amri Amri Wandel Wandel EldonejoEldonejo «Impeto»«Impeto» УДК 811.922 ББК 81.8 Эсп UDC 811.922 Internacia Kongresa Universitato 73-a sesio. Tutmonde. 1 — 8 de aŭgusto 2020 Redaktoroj: Anna Striganova, Dmitrij Ŝevĉenko, Amri Wandel Provlegis Rob Moerbeek Ред. Анна Стриганова, Дмитрий Шевченко, Амри Вандель Internacia Kongresa Universitato / Ред. Анна Стриганова, Дмитрий Шевченко, Амри Вандель. Международный Конгрессный Университет. На языке эсперанто — М.: Импэто, 2020. — 104 с. ISBN 978-5-7161-0314-6 УДК 811.922 ББК 81.8 Эсп Dankon al IKU-komisiono: Sabine Fiedler, Michael Maitzen, José Antonio Vergara, Humphrey Tonkin, Jingen Wen kaj Amri Wandel. Dankon pro la traduko kaj kontrolo: Edmund Grimley-Evans, Brian Moon, Yannick Janine Dumoulin, Claude Nourmont. Kun aŭspicio de Universala Esperanto-Asocio Akademio Internacia de la Sciencoj ISBN 978-5-7161-0314-6 © «Impeto», aranĝo, 2020 Enhavo Antaŭparolo ............................................................................................................................................................... 4 Redakcie .......................................................................................................................................
    [Show full text]
  • A Complete Grammar of Esperanto
    A COMPLETE GRAMMAR OF ESPERANTO IVY KELLERMAN∗ MEMBER OF THE EXECUTIVE COMMITTEE AND CHAIRMAN OF EXAMINATIONS FOR THE ESPERANTO ASSOCIATION OF NORTH AMERICA, MEMBER OF THE INTERNATIONAL ”LINGVA KOMITATO” TO DR. L. L. ZAMENHOF THE AUTHOR OF ESPERANTO PREFACE. This volume has been prepared to meet a twofold need. An adequate presentation of the International Language has become an imperative necessity. Such presentation, including full and accurate grammatical explanations, suitably graded reading lessons, and similarly graded material for translation from English, has not heretofore been accessible within the compass of a single volume, or in fact within the compass of any two or three volumes. The combination of grammar and reader here offered is therefore unique. It is to furnish not merely an introduction to Esperanto, or a superficial acquaintance with it, but a genuine understanding of the language and mastery of its use without recourse to additional textbooks, readers, etc. In other words, this one volume affords as complete a knowledge of Esperanto as several years’ study of a grammar and various readers will accomplish for any national language. Inflection, word-formation and syntax are presented clearly and concisely, yet with a degree of completeness and in a systematic order that constitute a new feature. Other points worthy of note are the following: The reasons for syntactical usages are given, instead of mere statements ∗PDF created by pdfbooks.co.za 1 that such usages exist. For example, clauses of purpose and of result are really explained, instead of being dismissed with the unsatisfactory remark that ”the imperative follows ’por ke,’” or the ”use of ’tiel ..
    [Show full text]
  • Labulteneto33günzburg.Pdf (2.480Mb)
    Numero 33 Jaro 2019 DULINGVA MAGAZINO ELDONATA EN VIENO 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 GÜNZBURG und der Maria Theresien-Taler GÜNZBURG kaj Maria Theresia-Talero Numero 33 • Jaro 2019 Redaktejo - eldonejo - presejo: Rudolfinergasse 8/11, 1190 Vieno, Aŭstrio, Eŭropa Unio. [email protected]. Papero: Mondi Color Copy 120 g m-2. Unverkäufliche, private Ausgabe – Nevendebla, privata eldono Skriboj: Calibri (teksto) kaj Times New Roman (klarigo de la bildoj). La paperan version ricevas donace Aŭstria Nacia Biblioteko, Vieno, Aŭstrio; aliaj bibliotekoj post peto. Auf der ersten Seite k Sur la unua paĝo Maria Theresien-Taler, Wiener Nachprägung nach dem Original as Günzburg Viena repregaĵo de Maria Theresia-Talero laŭ la originalo el Günzburg Hauptplatz von Günzburg mit dem Unteren Tor Ĉefplaco de Günzburg kun la Suba Pordego Fotoj: Walter Klag 2018 kaj 2019 se ne estas alia indiko. 2 Günzburg kaj Maria Theresia-Talero La plej fama arĝenta monero estas Maria Theresien-Taler (MTT), kiu havas sian nomon de la germana imperiestrino Maria Theresia [terézia]. Ŝi regis de 1740 ĝis 1780. Por kompreni, kial Talero estas grava monero, ni retroiras en la 15an jarcenton. En Tirolo - hodiaŭ aŭstria federacia lando - ekde 1446 regis la ĉefduko Siegmund der Münzreiche [Sigmundo riĉa je moneroj]. Siegmund signifas protektanto (Mund) de la venko (Sieg). 1484 li translokigis sian pregejon de Meran (Merano, nun Suda Tirolo, Italio) al Hall [hal], dek kilometrojn oriente de la tirola ĉefurbo Innsbruck [insbruk] pro du kialoj: Unue la turkoj minacis la sudan parton de Tirolo. Due proksime de Hall, en Schwaz [ŝvac], dudek kilometrojn nordoriente de Hall, troviĝis grava arĝento- minejo.
    [Show full text]
  • Anonymity Analysis of Cryptocurrencies
    Rochester Institute of Technology RIT Scholar Works Theses 4-20-2015 Anonymity Analysis of Cryptocurrencies Liam Morris Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Morris, Liam, "Anonymity Analysis of Cryptocurrencies" (2015). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Thesis Submitted for Master of Science in Computer Science Department of Computer Science Rochester Institute of Techology Anonymity Analysis of Cryptocurrencies Liam Morris [email protected] Chair: Professor Stanisław Radziszowski [email protected] Reader: Professor Warren Carithers [email protected] Observer: Professor Bo Yuan [email protected] Rochester, NY 14623 USA April 20, 2015 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science Department of Computer Science B. Thomas Golisano of Computing and Information Sciences Rochester Institute of Technology Rochester, NY 14623 USA Abstract Cash in the real world allows for parties to exchange currency without the need to go through some sort of central authority. One person, Alice, can simply hand cash over to another person, Bob. In this transaction the only two people that have knowledge of this exchange are Alice and Bob. Until recently there was no electronic equivalent to this exchange. In 1982 David Chaum proposed a system of anonymous electronic cash based on blind signatures, and in 1990 founded DigiCash as an electronic cash company.
    [Show full text]
  • § Tencelл Telperinquaro ¶
    § Tencelë Telperinquaro ¶ Celebrimbor's Script Merry Meet ! OMment’alassë ! Ever since I as a boy read the books of J.R.R. Ever since I as a boy read the books of Tolkien, I was captured by the beauty and ver- J.R.R. Tolkien, I was captured by the beauty satility of the ‘Tengwar’ writing system. and versatility of the ‚Tengwar’ writing sys- tem. I have regularly used Tengwar for private notes for 35 years now. Unfortunately, I never found a I have regularly used Tengwar for private notes for 35 years now. Unfortunately, I Tengwar computer font that matched my needs, never found a Tengwar computer font that so my Tengwa use remained constricted to pen matched my needs, so my Tengwa use remained and paper. constricted to pen and paper. However, as I do more and more work on the However, as I do more and more work on the computer, the need for a workable font grew computer, the need for a workable font grew more pregnant. So I decided to create my own more pregnant. So I decided to create my font, and here is the first draft. own font, and here is the first draft. A warning is in order, though. A warning is in order, though. Do not expect a beautiful calligraphic font. I did Do not expect a beautiful calligraphic font. not set out to write Quenya or Sindarin, I wanted I ditr not set out to write Quenya or Sinda- a font that I can use for my own notes, mostly in rin, I wanted a font that I can use for my own English and Dutch.
    [Show full text]
  • A Taxonomy of Cryptocurrency Wallets
    SoK: A Taxonomy of Cryptocurrency Wallets Kostis Karantias IOHK [email protected] Abstract. The primary function of a cryptocurrency is money trans- fer between individuals. The wallet is the software that facilitates such transfers. Wallets are nowadays ubiquitous in the cryptocurrency space and a cryptocurrency is usually supported by many wallets. Despite that, the functionality of wallets has never been formally defined. Addition- ally, the mechanisms employed by the many wallets in the wild remain hidden in their respective codebases. In this work we provide the first definition of a cryptocurrency wallet, which we model as a client to a server, or set of servers. We provide a distinction of wallets in various categories, based on whether they work for transparent or private cryptocurrencies, what trust assumptions they require, their performance and their communication overhead. For each type of wallet we provide a description of its client and server protocols. Additionally, we explore superlight wallets and describe their difference to superlight clients that have appeared in recent literature. We demon- strate how new wallet protocols can be produced by combining concepts from existing protocols. Finally we evaluate the performance and security characteristics of all wallet protocols and compare them. 1 Introduction Cryptocurrencies have seen a significant increase in usage in recent years. In 2008, Bitcoin was introduced to the world [48]. Along with the whitepaper, a piece of software implementing the cryptocurrency was released that contained a single user-facing application—the wallet. The wallet allowed users to interact with the cryptocurrency, to send it to others and receive it.
    [Show full text]