Search results

Jump to: navigation, search
  • * Proof quality
    18 KB (2,405 words) - 11:18, 27 August 2019
  • ...difficulty. Since Bitcoin nodes follow the chain with the most commutative proof of work, an increase by a factor of c is only square root of c harder to mi
    9 KB (1,374 words) - 08:42, 15 May 2024
  • ...lain our technology - we can't expect everyone to understand cryptographic proof -, hence this page can be a useful list of resources. * If Craig Wright really was the creator of Bitcoin, the proof would be trivial. We see an example by Charlie Lee the creator of Litecoin<
    4 KB (557 words) - 18:01, 27 April 2019
  • ...e it to disk immediately. This means that a disk-fill attack would require Proof of Work. 1) Proof-of-Work Meets Claimed Requirement: Here, the code checks that the block ha
    17 KB (2,744 words) - 20:32, 21 January 2016
  • ...candidate is on.) We call them "candidates" because we verify the block's proof-of-work when we receive the header, but before we receive the block. Thus, When the node receives and accepts a block that has more proof-of-work than the tip of its active blockchain, the node will attempt to mak
    13 KB (2,125 words) - 20:27, 21 January 2016
  • # [[Mining]] uses SHA-256 as the [[Proof of work]] algorithm.
    820 bytes (129 words) - 15:44, 29 January 2016
  • ...tographer and crypto-hacker notable as the inventor of [[Hashcash]], the [[proof-of-work]] system used by [[Bitcoin]].
    997 bytes (155 words) - 22:16, 1 March 2021
  • ...cial vaults, away from online security threats. (Know Your Customer: FICA, Proof of ID / residence required)
    2 KB (238 words) - 00:32, 24 April 2019
  • ...omy seems willing to make a "no confidence" hard-fork (such as a change in proof-of-work algorithm), the soft-fork does not become Final for as long as such ...s rules for the dynamic-membership multi-party signature (for Bitcoin, the proof-of-work algorithm), which can be modified with a hard-fork. Thus, if the sa
    34 KB (5,496 words) - 20:07, 24 April 2024
  • ...g the invoice hash from the PaymentRequest. The wallet will have encoded a proof of purchase to the blockchain without the wallet developer having to coordi
    6 KB (975 words) - 17:59, 24 September 2019
  • ...ed eventual convergence of the network in a single chain that has the most proof of work and also satisfies the rules. This can be intentional or be caused proof of work, effectively "pressing the restart button" on the ASIC
    18 KB (2,863 words) - 21:58, 30 April 2024
  • ** Proof of claim and minimum 1% stake via: *** Software: proof of ownership and user base (Min 1% of Bitcoin userbase)
    9 KB (1,333 words) - 21:43, 30 April 2024
  • === Compact fraud proof for SPV nodes === ...a false alarm. An alarm must come with a compact, yet deterministic fraud proof.
    26 KB (3,935 words) - 23:08, 26 April 2024
  • In cryptography, a '''zero-knowledge proof''' or '''zero-knowledge protocol''' is a method by which one party (the ''p
    293 bytes (44 words) - 20:26, 8 November 2016
  • ...ther tricky rules that are needed to keep the system in check (difficulty, proof of work, DoS protection, ...).
    7 KB (1,153 words) - 15:13, 16 March 2018
  • ...can spend a coin. Other cryptography is used in other ways, for example [[Proof of work]].
    4 KB (666 words) - 20:09, 17 September 2017
  • ...edge receiving the payment prior to a deadline by generating cryptographic proof of payment or forfeit the ability to claim the payment, returning it to the The cryptographic proof of payment the receiver generates can then be used to trigger other actions
    3 KB (404 words) - 07:30, 4 October 2021
  • With identity verification which means providing ID or passport and proof of residence, client are eligible for the gold package. Verification takes
    6 KB (940 words) - 00:35, 24 April 2019
  • ...ansactions. (this may be useful for a charity, revealing to an auditor, as proof of reserves for a custodian)
    6 KB (822 words) - 18:10, 4 March 2020
  • ...ority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. If a majority of CPU power is controlled by ...amping mechanism''. In other words, when it contemplates the majority of [[Proof of work|CPU power]] ''not'' being owned by honest nodes, the risk is that [
    9 KB (1,491 words) - 22:53, 15 May 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)