Completed
Overview
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptocurrency
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Attacking Threshold Wallets
- 3 Threshold signature schemes TSST
- 4 Forget & Forgive Setup
- 5 Golden Shoe Setup
- 6 Golden Shoe Vulnerability
- 7 Golden Shoe Exploit
- 8 Golden Shoe Mitigation
- 9 Takeaways
- 10 From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
- 11 Overview
- 12 Distributed Computation over a Netwo
- 13 Consensus Layer of Cardano
- 14 Theory + Practice Interplay
- 15 Connecting theory with implementation
- 16 Block-Fetch, Forecasting, Denial of Service
- 17 What are Randomness Beacons?
- 18 Important Beacon Parameters
- 19 Constructions: Verifiable Random Functic (VRF)
- 20 Constructions: Threshold VRFs
- 21 Lock Puzzles and Verifiable Delay Functions