找到约 13 条结果

文章 有趣的比特币脚本(三):时间锁

...间锁 [1](https://www.btcstudy.org/2023/04/21/interesting-bitcoin-scripts-and-its-use-cases-part-3-time-locks/#note1):一种称为 “绝对时间锁”,在一个 “具体” 的时间点(比如某个日期或某个区块高度)后解锁;另一种称为 “相对时间锁”,在一定...

文章 【Solidity Yul Assembly】1.4 | Storage Offsets and Bitshifting

...00000000000000000000000000000000000000000000000000000000ffff e := and(0xffff, shifted) } } ``` 读取 E 的做法是,将槽 0 中的内容读出,然后对该值右移 28 * 8 位。右移后,由于 E 前面还有值 F, 故需要用掩码把 E 前面的值全成为 0. 读出 E ...

文章 利用AR和VR桥接物理世界与数字世界

目录 [Toggle](https://blockapps.net/blog/bridging-the-physical-and-digital-worlds-with-ar-and-vr/#) ## Web3 和沉浸式技术的融合 互联网正处于一场革命性变革的风口浪尖,我们正朝着更加去中心化、以用户为中心和沉浸式的数字图景迈进。这个新时...

文章 介绍 | 大狗精读 PBFT 论文(二)

## 1 原文与翻译 > **1 Introduction** > Malicious attacks and software errors are increasingly common. The growing reliance of industry and government on online information services makes malicious attacks more attractive and makes the consequences of successful attacks more serious. In addi...

文章 BitVM白皮书中英文版本

... that claim is false, then the verifier can perform a succinct fraud proof and punish the prover. Using this mechanism, any computable function can be verified on Bitcoin. BitVM 是一种计算范式,用于表达[图灵完备](/cn/bitvm/base-knowlege/shi-mo-shi-tu-ling-wan-bei)的比特币合...

文章 默克尔准备金证明

...ssential cryptographic tool that is thought to boost the public confidence and transparency of user assets. It utilizes a particular data structure, Hash Tree or Merkle tree, to prove that the centralized exchange has adequate assets to serve its customers. The above picture from the wiki shows t...

文章 有趣的比特币脚本(五):闪电通道与闪电网络

...合约 [1](https://www.btcstudy.org/2023/04/24/interesting-bitcoin-scripts-and-its-use-cases-part-5-lightning-channels-and-lightning-network/#note1)。在签名承诺交易之后,支付的一方签名花费这个 2-of-2 输入的交易,并产生两个输出,一个输出给对方,面额是完...

文章 推出 Twist 和 Shout

...现在,Srinath Setty 和我发布了一篇新论文,揭示了 [Twist and Shout](https://eprint.iacr.org/2025/105),这是两个新的内存检查参数,用于确保证明者正确处理对 VM 内存的每次读取和写入。 Twist and Shout 背后的关键见解是,证明者可以快速...

文章 Samczsun talk about Re-entrancy

...he only difference between an attacker doing something in an external call and attacker do something before calling your contract is they are now in the middle of execution. whatever an attacker does they have to take advantage of the fact that they are in the middle of execution ### 1st patt...

文章 加密朋克宣言 - 中英双语

...parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. 如果两个当事方...

文章 optimism sequencer背后的魔法(一):sequencer究竟是如何在l2上构建区块的

...sactions, args.GasLimit) if err != nil { return nil, err } // Construct a payload object for return. payload := newPayload(empty, args.Id()) if args.NoTxPool { // don't start the background payload updating job if there is no tx pool to pull from return payload, nil } ...

文章 BRC-20, from Newbie to be Awesome

...C-20 named E**. It has a similar name, but what's the difference between B and E? B will bring about an electronic version of a text protocol without any code control, and E will guide to join a series of bright activities which is transaprently coded on blockchain. #### What is the definition of...

文章 区块链4.0之实现后量子区块链的必要性

..., G. et al. A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf Process 19, 420 (2020). [2] R. Shelke and S. B. Bagal, Iris Recognition System: A Novel Approach for Biometric Authentication, 2017 International Conference on Computing, Communication, Control and A...