Kaj sestavlja blockchain? thumbnail
slide-image
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Kaj sestavlja blockchain?

Published on May 30, 2019243 Views

Related categories

Chapter list

Kaj sestavlja Blockchain?00:00
Ingredient #1:02:35
What is Cryptography?02:48
Symmetric Cipher Model05:04
Symmetric (Secret Key) Crypto06:33
Public-Key Cryptography - 107:32
Public-Key Cryptography - 209:59
(Simple) RSA Algorithm - 110:50
(Simple) RSA Algorithm - 211:36
Ingredient #2:18:02
Cryptography Hash Functions I - 118:30
Cryptography Hash Functions I - 221:23
Cryptography Hash Functions II22:24
Example use: Passwords24:35
Example use: Hash Pointers26:29
Example Use: Self-certifying names27:40
Self-certifying names29:18
Main Example: Hash chains30:11
Hash chains31:18
Hash chain application – Blockchain32:49
Ingredient #3 - 134:40
How traditional e-cash handled problem - 135:29
How traditional e-cash handled problem - 237:02
Ingredient #3 - 237:11
Bitcoin (10,000 foot view)38:03
Blockchain: Append-only hash chain - 139:30
Blockchain: Append-only hash chain - 240:00
Problem remains: forking - 140:34
Problem remains: forking - 241:10
Ingredient #4:41:11
Consensus dosent happen by magic... You hva to drive to it.41:38
The Random Bar Problem - 142:37
The Random Bar Problem - 242:58
The Random Bar Problem - 343:43
The Random Bar Problem - 444:24
The Byzantine Generals Problem - 144:57
The Byzantine Generals Problem - 245:12
Outline45:14
Objevtives - 145:17
Objevtives - 246:47
Model Description - 147:38
Model Description - 249:26
Model Description - 349:54
Model Description - 451:02
Single-Voter Approach - 152:17
Single-Voter Approach - 253:56
PULL approach - 154:37
PULL approach - 255:31
PULL approach (2)55:35
PULL approach (3)55:37
PULL approach (4)55:38
PULL approach (5)55:39
PULL approach (6)55:40
PULL approach (7)55:41
PULL approach (8)55:41
PULL approach (9)55:43
2-Voter Approach56:00
2-Voter Approach (0)58:20
2-Voter Approach (1)58:32
2-Voter Approach (2)58:40
2-Voter Approach (3)58:49
2-Voter Approach (0)59:01
2-Voter Approach (1)59:43
2-Voter Approach (2)59:43
2-Voter Approach (3)59:46
2-Voter Approach (4)59:47
2-Voter Approach (5)59:53
2-Voter Approach (6)59:54
2-Voter Approach (7)59:57
2-Voter Approach 01:00:17
Random gossiping01:01:01
Our Results01:03:56
Consensus susceptible to Sybils01:04:45
Ingredient #5:01:06:55
Consensus based on “work”01:08:07
Form of randomized leader election01:09:37
Key idea: Chain length requires work01:10:58
Use hashing to determine work!01:15:38
The Proof of Work - 101:20:28
The Proof of Work - 201:23:27
Historical hash rate trends of bitcoin01:25:05
Why consume all this energy?01:26:39
Incentivizing correct behavior?01:28:38
Ingredient #6:01:29:31
One block = many transactions01:30:01
Transaction format:01:30:51
Transaction format - 101:30:53
Storage / verification efficiency01:30:54
Ingredient ##01:30:56
How long does one transaction take?01:30:59
When do you trust a transaction?01:32:05
Does it scale?01:32:15
Bitcoin & blockchain intrinsically linked01:34:39
Rich ecosystem: Mining pools01:34:49
More than just a currency… - 101:34:52
More than just a currency… - 201:34:53