Читать книгу Bitcoin for Nonmathematicians: - Slava Gomzin - Страница 9
На сайте Литреса книга снята с продажи.
ОглавлениеContents
Foreword by Doug McClellan
Introduction
| Part I | From Coins to Crypto | |||
| Chapter 1 | Traditional Money | |||
| Commodities versus Gold | ||||
| Payment Cards | ||||
| Mobile Payments | ||||
| From Coins to Crypto | ||||
| Chapter 2 | Digital Gold | |||
| Gold Standard | ||||
| E-gold | ||||
| e-Bullion | ||||
| Chapter 3 | Centralized Digital Payments | |||
| DigiCash and ecash | ||||
| Online Currencies: Flooz and Beenz | ||||
| Liberty Reserve | ||||
| Online Payment Processors | ||||
| Chapter 4 | Cryptocurrencies | |||
| Satoshi Nakamoto White Paper | ||||
| Double-Spending Problem | ||||
| Decentralization | ||||
| Privacy: Anonymity or Pseudonymity | ||||
| Blockchain | ||||
| Byzantine Generals’ Problem | ||||
| Mining | ||||
| Part I Summary | ||||
| Part II | Bitcoin Cryptography | |||
| Chapter 5 | Types of Encryption | |||
| Symmetric Encryption | ||||
| One-Way Hash Functions | ||||
| One-Way Function and Message Digest | ||||
| Collision | ||||
| SHA-256 | ||||
| RIPEMD-160 | ||||
| Public-Key (Asymmetric) Cryptography | ||||
| Digital Signatures | ||||
| Chapter 6 | RSA Step by Step | |||
| One-Way Functions | ||||
| Let’s Start | ||||
| Public Key: Just a Random Number | ||||
| Modulus: It’s Like a Clock Dial | ||||
| Encryption: Plaintext to the Power of Public Key | ||||
| Private Key: Phi Function + Modular Inversion | ||||
| Decryption: Ciphertext to the Power of Private Key | ||||
| Chapter 7 | How Elliptic Curves Work | |||
| The Graph | ||||
| Horizontal Symmetry and Points of Intersection | ||||
| Point Operations | ||||
| Point Addition | ||||
| Point Doubling | ||||
| Point Multiplication | ||||
| One-Way Function | ||||
| Limiting the Curve for the Sake of Cryptography | ||||
| Generating the Keys | ||||
| Encryption | ||||
| Decryption | ||||
| Just a Little Bit of Math | ||||
| Point Addition: C = A + B | ||||
| Point Doubling: C = A + A = 2A | ||||
| Now Let’s Play with the Numbers | ||||
| Encryption | ||||
| Decryption | ||||
| Bonus Chapter | Experimenting with the Code | |||
| Modulus | ||||
| Modular Inversion | ||||
| Representing the Points | ||||
| Point Doubling | ||||
| Point Addition | ||||
| Point Multiplication | ||||
| Calculating the Public Key | ||||
| Encryption | ||||
| Decryption | ||||
| Part II Summary |
References
Index