
0.25
0.5
0.75
1.25
1.5
1.75
2
Presentation
Kaj sestavlja Blockchain?00:00
Ingredient #1:43:16:43
What is Cryptography?46:42:56
Symmetric Cipher Model84:40:31
Symmetric (Secret Key) Crypto109:20:19
Public-Key Cryptography - 1125:47:57
Public-Key Cryptography - 2166:37:32
(Simple) RSA Algorithm - 1180:37:20
(Simple) RSA Algorithm - 2193:24:11
Ingredient #2:300:46:44
Cryptography Hash Functions I - 1308:23:48
Cryptography Hash Functions I - 2356:39:16
Cryptography Hash Functions II373:24:12
Example use: Passwords409:58:38
Example use: Hash Pointers441:35:52
Example Use: Self-certifying names461:17:01
Self-certifying names488:28:15
Main Example: Hash chains503:12:53
Hash chains521:47:18
Hash chain application – Blockchain546:59:52
Ingredient #3 - 1577:52:51
How traditional e-cash handled problem - 1591:25:00
How traditional e-cash handled problem - 2617:23:34
Ingredient #3 - 2619:51:27
Bitcoin (10,000 foot view)634:18:39
Blockchain: Append-only hash chain - 1658:27:11
Blockchain: Append-only hash chain - 2666:55:51
Problem remains: forking - 1676:06:46
Problem remains: forking - 2686:17:34
Ingredient #4:686:37:28
Consensus dosent happen by magic... You hva to drive to it.694:08:58
The Random Bar Problem - 1710:24:24
The Random Bar Problem - 2716:09:06
The Random Bar Problem - 3728:47:00
The Random Bar Problem - 4740:15:53
The Byzantine Generals Problem - 1749:20:41
The Byzantine Generals Problem - 2753:30:00
Objevtives - 1754:56:55
Objevtives - 2779:49:25
Model Description - 1794:04:23
Model Description - 2824:03:33
Model Description - 3831:45:12
Model Description - 4850:41:31
Single-Voter Approach - 1871:31:38
Single-Voter Approach - 2899:03:13
PULL approach - 1910:20:03
PULL approach - 2925:22:42
PULL approach (2)926:33:30
PULL approach (3)927:11:15
PULL approach (4)927:29:07
PULL approach (5)927:39:30
PULL approach (6)927:48:46
PULL approach (7)928:04:20
PULL approach (8)928:12:54
PULL approach (9)928:49:41
2-Voter Approach933:25:17
2-Voter Approach (0)972:25:33
2-Voter Approach (1)975:49:18
2-Voter Approach (2)977:57:17
2-Voter Approach (3)980:32:45
2-Voter Approach (0)983:43:07
2-Voter Approach (1)995:26:17
2-Voter Approach (2)995:26:18
2-Voter Approach (3)996:16:22
2-Voter Approach (4)996:30:27
2-Voter Approach (5)998:07:43
2-Voter Approach (6)998:29:40
2-Voter Approach (7)999:10:28
2-Voter Approach 1004:48:34
Random gossiping1017:09:58
Our Results1065:44:10
Consensus susceptible to Sybils1079:23:19
Ingredient #5:1115:20:02
Consensus based on “work”1135:27:45
Form of randomized leader election1160:27:18
Key idea: Chain length requires work1182:56:25
Use hashing to determine work!1260:40:27
The Proof of Work - 11341:19:14
The Proof of Work - 21390:59:38
Historical hash rate trends of bitcoin1418:17:15
Why consume all this energy?1444:21:24
Incentivizing correct behavior?1477:14:04
Ingredient #6:1492:12:41
One block = many transactions1500:23:03
Transaction format:1514:16:17
Transaction format - 11514:48:25
Storage / verification efficiency1515:13:11
Ingredient ##1515:33:33
How long does one transaction take?1516:30:46
When do you trust a transaction?1534:52:30
Does it scale?1537:30:38
Bitcoin & blockchain intrinsically linked1577:44:20
Rich ecosystem: Mining pools1580:32:35
More than just a currency… - 11581:13:13
More than just a currency… - 21581:38:54