- Make 0-conf double spend infeasable by fixing the r value ahead of time, thereby putting the coins up for grabs when a second transaction is signed https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm 29 comments btc
Linking pages
- Erlang/OTP 24 Highlights - Erlang/OTP http://blog.erlang.org/My-OTP-24-Highlights/ 111 comments
- Inside an Ethereum transaction. Ethereum can be thought of as a… | by CodeTract | Medium https://medium.com/@codetractio/inside-an-ethereum-transaction-fa94ffca912f#.e9nqk08lg 58 comments
- Major cryptography blunder in Java enables “psychic paper” forgeries | Ars Technica https://arstechnica.com/information-technology/2022/04/major-crypto-blunder-in-java-enables-psychic-paper-forgeries 43 comments
- You’ve Bought Bitcoin, Congratulations! But What Does It Mean To Own Some Bitcoin? https://inbitcoinwetrust.substack.com/p/youve-bought-bitcoin-congratulations 31 comments
- Schnorr Signatures Are Coming to Bitcoin Cash – Here’s What You Should Know – Technology Bitcoin News https://news.bitcoin.com/schnorr-signatures-are-coming-to-bitcoin-cash-heres-what-you-should-know/ 31 comments
- GitHub - Dentrax/cocert: Split and distribute your private keys securely amongst untrusted network https://github.com/Dentrax/cocert 24 comments
- Microsoft's Chain of Fools https://blog.lessonslearned.org/chain-of-fools/ 23 comments
- A Crash Course in Everything Cryptographic | by Leo Whitehead | DataSeries | Medium https://medium.com/@lduck11007/a-crash-course-in-everything-cryptographic-50daa0fda482 19 comments
- Bitcoin Transaction Malleability https://eklitzke.org/bitcoin-transaction-malleability 18 comments
- Writing Proof Of Work Blockchain full-node from scratch | by Andrey Nikishaev | Medium https://a-nikishaev.medium.com/writing-proof-of-work-blockchain-full-node-from-scratch-848ef33d7448 17 comments
- Overview Bitcoin’s Cryptography - Bitcoin Magazine - Bitcoin News, Articles and Expert Insights https://bitcoinmagazine.com/technical/overview-bitcoins-cryptography 14 comments
- On Abstraction | Ethereum Foundation Blog https://blog.ethereum.org/2015/07/05/on-abstraction/ 14 comments
- Hashing Apples, Bananas and Cherries | Pascal Junod https://crypto.junod.info/posts/recursive-hash/ 10 comments
- Solidity Security: Comprehensive list of known attack vectors and common anti-patterns https://blog.sigmaprime.io/solidity-security.html 5 comments
- The Dfinity Consensus White Paper – Jackson Kelley https://sjkelleyjrblog.wordpress.com/2018/02/03/the-dfinity-consensus-white-paper/ 5 comments
- Introducing the `k256` crate: a pure Rust secp256k1 library based on projective formulas https://iqlusion.blog/k256-crate-pure-rust-projective-secp256k1-library 5 comments
- Coin Metrics’ State of the Network: Issue 204 https://coinmetrics.substack.com/p/state-of-the-network-issue-204 5 comments
- New attack steals secret crypto keys from Android and iOS phones | Ars Technica http://arstechnica.com/security/2016/03/new-attack-steals-secret-crypto-keys-from-android-and-ios-phones/ 4 comments
- Public Key Cryptography — A Comprehensive Guide | by Till Antonio Mahler | blockwhat? | Medium https://medium.com/blockwhat/public-key-cryptography-a-comprehensive-guide-1e8489e08104 4 comments
- Blockchain Attack Vectors: Vulnerabilities of the Most Secure Technology | Apriorit https://www.apriorit.com/dev-blog/578-blockchain-attack-vectors 4 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Elliptic Curve Digital Signature Algorithm - Wikipedia
See how to search.