找到约 12 条结果

文章 闪电网络:技术与用户体验(七):手续费支付

...tps://www.btcstudy.org/2024/03/04/lightning-network-technology-improvement-and-users-experience-part-6/)* 在本系列的[第二篇文章](https://www.btcstudy.org/2024/03/04/lightning-network-technology-improvement-and-users-experience-part-2/)中,我们已经指出,闪电通道的构造方...

文章 2021年头部区块链开发框架总结

...fa5e7bd04--------------------------------) _ > The best smart contract and blockchain developer frameworks, focusing on Ethereum smart contracts across all languages > 最好的智能合约和区块链开发者框架总结,并专注于所有适用语言的以太坊智能合约开发。 ![i...

文章 Web3行研会分享(2023/03/31期):探索 Celestia 的核心技术与最新进展(In Chinese)

...* ### 第三部分:最近进展,测试网和翻译 *Part3:News and Progress, Testnet Practice and Translation* ### 第四部分:市场评估 *Part4:Market Evaluation* (后面三部分暂时不打算弄了,因为实在太长,而且技术有关的东西,也需要演示...

文章 2024-08-18 zk-insights Weekly

...lementation in Plonky3 This repo implements a Fibonacci sequence generator and prover using the Plonky3 framework. - ### Lemma: ZK Theorem Proving Lemma is a ZK theorem proving framework that enables individuals to post unsolved theorem definitions accompanied by a bounty for anyone that can submi...

文章 Metaverse和Web3的基础知识

...录 [切换](https://blockapps.net/blog/the-fundamentals-of-the-metaverse-and-web3/#) ## 什么是Web3? Web3,也称为去中心化网络,代表了互联网的下一个主要演变,紧随Web 1.0(“只读”网络)和Web 2.0(“读/写”网络)的时代 [1](https://www.ciena.com/i...

文章 增强区块链安全的新兴技术

...交易并破坏区块链的完整性([‘Top blockchain attacks, hacks and security issues explained \| TechTarget’](https://www.techtarget.com/searchsecurity/tip/Top-blockchain-security-attacks-hacks-and-issues))。另一个日益严重的问题是 **加密劫持**,攻击者劫持设备以...

文章 tendermint的共识详解

...of this approach is that service replicas start in the same initial state, and then execute requests (also called transactions) in the same order; thereby guaranteeing that replicas stay in sync with each other. The role of consensus in the SMR approach is ensuring that all replicas receive transact...

文章 有趣的比特币脚本(三):时间锁

...间锁 [1](https://www.btcstudy.org/2023/04/21/interesting-bitcoin-scripts-and-its-use-cases-part-3-time-locks/#note1):一种称为 “绝对时间锁”,在一个 “具体” 的时间点(比如某个日期或某个区块高度)后解锁;另一种称为 “相对时间锁”,在一定...

文章 利用AR和VR桥接物理世界与数字世界

目录 [Toggle](https://blockapps.net/blog/bridging-the-physical-and-digital-worlds-with-ar-and-vr/#) ## Web3 和沉浸式技术的融合 互联网正处于一场革命性变革的风口浪尖,我们正朝着更加去中心化、以用户为中心和沉浸式的数字图景迈进。这个新时...

文章 介绍 | 大狗精读 PBFT 论文(二)

## 1 原文与翻译 > **1 Introduction** > Malicious attacks and software errors are increasingly common. The growing reliance of industry and government on online information services makes malicious attacks more attractive and makes the consequences of successful attacks more serious. In addi...

文章 BitVM白皮书中英文版本

... that claim is false, then the verifier can perform a succinct fraud proof and punish the prover. Using this mechanism, any computable function can be verified on Bitcoin. BitVM 是一种计算范式,用于表达[图灵完备](/cn/bitvm/base-knowlege/shi-mo-shi-tu-ling-wan-bei)的比特币合...

文章 【Solidity Yul Assembly】1.4 | Storage Offsets and Bitshifting

...00000000000000000000000000000000000000000000000000000000ffff e := and(0xffff, shifted) } } ``` 读取 E 的做法是,将槽 0 中的内容读出,然后对该值右移 28 * 8 位。右移后,由于 E 前面还有值 F, 故需要用掩码把 E 前面的值全成为 0. 读出 E ...