Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptocurrency

TheIACR via YouTube

Overview

Explore the world of cryptocurrency in this 48-minute lecture covering a range of topics from attacking threshold wallets to the Cardano consensus layer. Dive into threshold signature schemes, the Golden Shoe setup and vulnerability, and learn about mitigating exploits. Discover the intricacies of distributed computation over networks and how theory interplays with practical implementation in blockchain technology. Examine block-fetch mechanisms, forecasting, and denial of service prevention. Investigate randomness beacons, their important parameters, and constructions like Verifiable Random Functions (VRF) and Threshold VRFs. Conclude with an introduction to lock puzzles and Verifiable Delay Functions, gaining a comprehensive understanding of cutting-edge cryptocurrency concepts and security measures.

Syllabus

Intro
Attacking Threshold Wallets
Threshold signature schemes TSST
Forget & Forgive Setup
Golden Shoe Setup
Golden Shoe Vulnerability
Golden Shoe Exploit
Golden Shoe Mitigation
Takeaways
From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
Overview
Distributed Computation over a Netwo
Consensus Layer of Cardano
Theory + Practice Interplay
Connecting theory with implementation
Block-Fetch, Forecasting, Denial of Service
What are Randomness Beacons?
Important Beacon Parameters
Constructions: Verifiable Random Functic (VRF)
Constructions: Threshold VRFs
Lock Puzzles and Verifiable Delay Functions

Taught by

TheIACR

Reviews

Start your review of Cryptocurrency

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.