找到约 14 条结果

文章 2021年头部区块链开发框架总结

...fa5e7bd04--------------------------------) _ > The best smart contract and blockchain developer frameworks, focusing on Ethereum smart contracts across all languages > 最好的智能合约和区块链开发者框架总结,并专注于所有适用语言的以太坊智能合约开发。 ![i...

文章 Web3行研会分享(2023/03/31期):探索 Celestia 的核心技术与最新进展(In Chinese)

...* ### 第三部分:最近进展,测试网和翻译 *Part3:News and Progress, Testnet Practice and Translation* ### 第四部分:市场评估 *Part4:Market Evaluation* (后面三部分暂时不打算弄了,因为实在太长,而且技术有关的东西,也需要演示...

文章 介绍 | 大狗精读 PBFT 论文(二)

## 1 原文与翻译 > **1 Introduction** > Malicious attacks and software errors are increasingly common. The growing reliance of industry and government on online information services makes malicious attacks more attractive and makes the consequences of successful attacks more serious. In addi...

文章 tendermint的共识详解

...of this approach is that service replicas start in the same initial state, and then execute requests (also called transactions) in the same order; thereby guaranteeing that replicas stay in sync with each other. The role of consensus in the SMR approach is ensuring that all replicas receive transact...

文章 推出 Twist 和 Shout

...现在,Srinath Setty 和我发布了一篇新论文,揭示了 [Twist and Shout](https://eprint.iacr.org/2025/105),这是两个新的内存检查参数,用于确保证明者正确处理对 VM 内存的每次读取和写入。 Twist and Shout 背后的关键见解是,证明者可以快速...

文章 默克尔准备金证明

...ssential cryptographic tool that is thought to boost the public confidence and transparency of user assets. It utilizes a particular data structure, Hash Tree or Merkle tree, to prove that the centralized exchange has adequate assets to serve its customers. The above picture from the wiki shows t...

文章 BitVM白皮书中英文版本

... that claim is false, then the verifier can perform a succinct fraud proof and punish the prover. Using this mechanism, any computable function can be verified on Bitcoin. BitVM 是一种计算范式,用于表达[图灵完备](/cn/bitvm/base-knowlege/shi-mo-shi-tu-ling-wan-bei)的比特币合...

文章 2024-08-11 zk-insights Weekly

...rpose cryptography to programmable cryptography. - ### SuperSpartan by Hand The goal of this article is to dive into the techniques behind the SuperSpartan's polynomial IOP, which uses the sum-check protocol to prove CCS instances, by writing the protocol explicitely for a specific example. - ...

文章 Samczsun talk about Re-entrancy

...he only difference between an attacker doing something in an external call and attacker do something before calling your contract is they are now in the middle of execution. whatever an attacker does they have to take advantage of the fact that they are in the middle of execution ### 1st patt...

文章 BRC-20, from Newbie to be Awesome

...C-20 named E**. It has a similar name, but what's the difference between B and E? B will bring about an electronic version of a text protocol without any code control, and E will guide to join a series of bright activities which is transaprently coded on blockchain. #### What is the definition of...

文章 区块链4.0之实现后量子区块链的必要性

..., G. et al. A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf Process 19, 420 (2020). [2] R. Shelke and S. B. Bagal, Iris Recognition System: A Novel Approach for Biometric Authentication, 2017 International Conference on Computing, Communication, Control and A...

文章 加密朋克宣言 - 中英双语

...parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. 如果两个当事方...

文章 基于先到先服务的交易排序能否防止抢跑?

...反馈和审核!** ![](https://img.learnblockchain.cn/2025/03/04/fcfs-and-front-running.png) ## 引言与问题陈述 交易提交到内存池的顺序通常不是它们在账本中最终的顺序。术语 _最大可提取价值_ (MEV)包括通过主动操纵交易的顺序、插入和审...

文章 (部分)解释的Casper CBC规范 | 作者:Barnabé Monnot | Medium

...会导致内部不一致(例如崩溃)? **正确构造(Correct-By-Construction,CBC)**方法论采取了不同的方法。我们指定一组基本原则,并从这些基本原则中通过逻辑归纳推导出正确性:这就是 CBC 的方式。为了实际有用,这些基本原则...