Search results

Jump to: navigation, search
  • ...-2 transaction spends one of these version-1 outputs, the hardcoded public key will be used instead of the hash. ...on: an attacker can sign for a public key that he does not own the private key for in only a few days of work.
    12 KB (1,945 words) - 07:44, 26 September 2022
  • ..., it probably comes with an immobilizer. Immobilizers augment the physical key with a protocol exchange ensuring only the holders of the correct cryptogra ...ed. The private key is usually itself held in a physical container (like a key or SIM card) and can't be easily transferred or manipulated. Smart property
    9 KB (1,575 words) - 16:36, 16 July 2018
  • ...ing bitcoins|storing Bitcoins]] offline and spending without the [[private key]]s controlling them ever being online. This resists theft by hackers and ma # Obtain the [[Deterministic wallet#Master public key|master public key]] of the wallet you just generated and transfer it to the online computer.
    13 KB (2,164 words) - 12:31, 2 January 2021
  • ...h was popular between 2011 and 2016. It works by having a single [[private key]] and bitcoin [[address]], usually generated by a website, being printed ou ...will be saved. Anybody who reads the file will be able to see the private key and steal the stored bitcoins. Shared printers such as in schools, offices
    10 KB (1,567 words) - 01:08, 11 January 2021
  • A '''private key''' in the context of Bitcoin is a secret number that allows bitcoins to be Because the private key is the "ticket" that allows someone to spend bitcoins, it is important that
    7 KB (1,091 words) - 14:14, 4 May 2019
  • ...it for review. However, wherever possible, long open-ended discussions on public mailing lists should be avoided. Strategies to keep the discussions efficie It is highly recommended that a single BIP contain a single key proposal or new idea. The more focused the BIP, the more successful it tend
    16 KB (2,623 words) - 10:02, 1 January 2021
  • ! Key !! Required !! Type !! Description ! Key !! Required !! Type !! Description
    14 KB (2,096 words) - 15:42, 15 December 2021
  • ...> where '''ECDSA_publicKey''' is a public key the wallet knows the private key for; version <code>0x00</code> (these addresses begin with the digit '1') ==Encoding a private key==
    7 KB (1,076 words) - 22:03, 28 October 2021
  • ...3.0 and since 0.14.0 any old nodes will receive a static hard-coded "Alert Key Compromised" message. ...alert system was retired, so there is no longer any special group of alert-key-holders.
    6 KB (800 words) - 23:59, 11 July 2022
  • You can find Private key in WIF (Wallet Import/Export Format) and compressed key. Bitcoin addresses in compressed/ uncompressed formats, SegWit (P2SH-P2WPKH ...ess by hashing a passphrase to create a private key and therefore a public key and resultant address. Seeing as a Bitcoin address is usually a 256 bit str
    2 KB (373 words) - 19:17, 28 April 2019
  • ...at their wallet protection service provide them with copies of the private key(s) used to secure their wallets that they can safely store off-line, so tha ...etails of how buyer, seller, and agent communicate to gather signatures or public keys are outside the scope of this BIP.
    4 KB (664 words) - 00:29, 1 October 2022
  • ...respend the received coins, in contrast to needing a single ECDSA private key as in current implementations of Bitcoin. ...in.it/wiki/Script script], rather than the encoded hash of an ECDSA public key.
    4 KB (564 words) - 18:00, 24 September 2019
  • * Deterministic key generation: If you lose your wallet file, you can recover it from its [[see ...rating system. For all operating systems, you must have Electrum's signing key downloaded to verify the Electrum binaries. This can be downloaded from htt
    12 KB (1,784 words) - 00:02, 8 May 2024
  • ...t the value of the coin has not and cannot be spent as long as the private key remains hidden. ...tamper-evident seal can be carefully replaced after obtaining the private key.
    709 bytes (114 words) - 14:30, 13 June 2018
  • [[File:PubKeyToAddr.png|thumb|right|Conversion from ECDSA public key to Bitcoin Address]] ...can "sign" data with your [[private key]] and anyone who knows your public key can verify that the signature is valid.
    5 KB (921 words) - 06:45, 25 February 2021
  • ...using the Eigenfaces algorithm. There would be no need to obtain a public key from them ahead of time meaning that, for example, you could send money to First I encrypt X with random key K, Ex=AES(X,K).
    7 KB (1,240 words) - 11:17, 8 April 2020
  • ...ecp256k1 with the [[ECDSA]] algorithm, though the same curve with the same public/private keys can be used in some other algorithms such as [[Schnorr]].
    3 KB (501 words) - 00:14, 24 April 2019
  • ...to funds on the [[blockchain]] can spend the funds. In Bitcoin, a private key is a single unsigned 256 bit integer (32 bytes). ...ode>x</code> and <code>y</code> (2 * 32 bytes). The prefix of a compressed key allows for the <code>y</code> value to be derived from the <code>x</code> v
    6 KB (967 words) - 02:31, 3 April 2022
  • public: public:
    19 KB (2,806 words) - 21:51, 30 April 2024
  • ...llow the creation of public addresses without the knowledge of the private key. Seeds are typically serialized into human-readable words in a [[seed phras === Master public key ===
    4 KB (632 words) - 17:04, 27 July 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)