"BITS"

の検索結果

コース (0)

記事 (93)

用語集 (1)

What is the Orchid Protocol? All You Need to Know About OXT
Intermediate

What is the Orchid Protocol? All You Need to Know About OXT

The Orchid protocol is a decentralized marketplace for internet bandwidth. It allows users to pay for bandwidth in bits, granting them access to its secure virtual private network (VPN).
5/27/2024, 10:32:13 AM
Binius, a Highly Efficient Proof System
Advanced

Binius, a Highly Efficient Proof System

Vitalik Buterin provides a detailed introduction to Binius, a highly efficient proof system based on binary fields. The article first reviews the concepts of finite fields and arithmetization, explaining how SNARK and STARK proof systems work by converting program statements into polynomial equations. Vitalik points out that although Plonky2 has proven that using smaller 64-bit and 31-bit fields can significantly improve the efficiency of proof generation, Binius further enhances efficiency by operating directly on zeros and ones, taking advantage of the features of binary fields. Binius uses multivariate polynomials to represent computational traces and employs a series of mathematical tricks, including the concept of hypercubes and Reed-Solomon encoding, to construct proofs. Vitalik believes that the direct computational ability of binary fields and operations on bits are key to Binius's efficiency.
5/16/2024, 8:52:36 AM
Bitcoin Native Economics - The Patterns Behind the Bull Market
Beginner

Bitcoin Native Economics - The Patterns Behind the Bull Market

The Bitcoin bull market introduces new narratives and record-high prices. Beyond ETFs and halvings, the Bitcoin ecosystem revolution is rapidly progressing. Technological advancements expand Bitcoin's application scenarios, like the Ordinals protocol and the Rare Sats market. UTXO is the fundamental unit of Bitcoin transactions, with each UTXO being indivisible. Digital Matter Theory proposes a framework for deriving non-arbitrary value from Bitcoin blocks. DMT presents a new digital asset framework, opening new frontiers for blockchain. Bits are the underlying elements of the Bitcoin ecosystem, driven by the innovation and evolution of Bitcoin native asset issuance.
3/30/2024, 7:26:28 AM
What is a Wallet?
Beginner

What is a Wallet?

In this post, we'll cover what a wallet is, how wallets are made, and how they use elliptic curve cryptography to generate and secure private-public key pairs, derive seed phrases, and facilitate secure blockchain interactions.
10/1/2024, 6:12:41 PM
Quantum Computers and Cryptocurrencies
Intermediate

Quantum Computers and Cryptocurrencies

Quantum computing is an emerging technology that makes use of the laws of quantum mechanics to solve complex problems too advanced for classical computers.
3/29/2023, 2:17:51 PM
What is a Bloom Filter in Blockchain?
Intermediate

What is a Bloom Filter in Blockchain?

Discover the role of Bloom Filters in enhancing blockchain's efficiency and privacy, and explore their wide-ranging applications beyond blockchain.
11/3/2023, 4:13:05 AM
After Seven Years of Ups and Downs, OpenSea Has Finally Decided to Issue a Token
Intermediate

After Seven Years of Ups and Downs, OpenSea Has Finally Decided to Issue a Token

The article analyzes how OpenSea rose in the NFT market by focusing on its core business and streamlining operations, as well as its ups and downs amid market competition. With the rise of competitors like Blur, OpenSea's market share has been significantly eroded. Its decision to issue a token is seen as an attempt to save itself and reclaim its market position.
3/3/2025, 5:54:04 AM
Unveiling the Mystery of Mining
Beginner

Unveiling the Mystery of Mining

This article provides a detailed introduction to the "mining" process in blockchain. By drawing an analogy with traditional mining activities, it explains the basic concept of digital mining, which involves using computational resources to solve mathematical problems for transaction validation and new currency issuance.
7/17/2024, 1:18:16 AM
In-depth Analysis of Two ZK Vulnerabilities
Intermediate

In-depth Analysis of Two ZK Vulnerabilities

This article provides an in-depth analysis of two potential vulnerabilities in Zero-Knowledge Proof (ZKP) systems: the "Load8 Data Injection Attack" and the "Forgery Return Attack." The article details the technical specifics of these vulnerabilities, how they can be exploited, and the methods for fixing them. Additionally, it discusses the lessons learned from discovering these vulnerabilities during the auditing and formal verification processes of ZK systems and suggests best practices for ensuring the security of ZK systems.
6/5/2024, 1:46:28 PM
What Is Symmetric Key Cryptography?
Beginner

What Is Symmetric Key Cryptography?

Cryptography is the cornerstone of blockchain security. A large number of cryptographic algorithms are used in the entire blockchain system. Among them, symmetric key cryptography is a basic cryptography algorithm in modern cryptography.
12/22/2022, 8:46:49 AM
Cryptocurrency vs. quantum computing
Beginner

Cryptocurrency vs. quantum computing

The full impact of quantum computing on cryptocurrency is a huge concern for the industry. Once quantum computing is fully developed, it could crack the cryptography behind digital currencies in minutes. If you own crypto, continue reading to learn about the threat of cryptocurrency vs. quantum computing, the future of cryptocurrency and quantum computing, and what you can do to protect yourself.
11/10/2024, 12:00:52 PM
Quantum Computing and Google's Willow Chip: Crypto’s Future Challenges and Responses
Intermediate

Quantum Computing and Google's Willow Chip: Crypto’s Future Challenges and Responses

With breakthroughs in quantum computing, the security of cryptocurrencies is facing unprecedented challenges. Google's newly launched Willow quantum chip demonstrates quantum computing’s powerful potential. Many experts warn that it could shake the foundations of current encryption technologies and even threaten the survival of major cryptocurrencies like Bitcoin. This article will explore the development of quantum computing, its potential impact on cryptocurrencies, and how the market might respond to this technological revolution.
2/28/2025, 2:15:38 AM
What Is PGP Encryption?
Beginner

What Is PGP Encryption?

Understanding an essential encryption program for the modern age
1/19/2023, 11:03:55 AM
Analysis of Bitcoin Layer 2 Scaling Technology: Validity Proof and Fraud Proof
Advanced

Analysis of Bitcoin Layer 2 Scaling Technology: Validity Proof and Fraud Proof

Get an in-depth understanding of the Layer 2 expansion plan in the Bitcoin network, especially the validity proof and fraud proof technology. This article analyzes how to achieve Layer 2 expansion through technological innovation under the strict restrictions of Bitcoin, including Bit Commitment, Taproot, and Connector Output. and contracts, etc.
10/22/2024, 6:28:13 AM
What Are Asymmetric-key Algorithms
Beginner

What Are Asymmetric-key Algorithms

Asymmetric-key Algorithms are algorithms that can encrypt and decrypt information.
11/21/2022, 10:17:06 AM

暗号資産の世界へのゲートウェイ、Gateに登録して新たな視点を手に入れましょう

暗号資産の世界へのゲートウェイ、Gateに登録して新たな視点を手に入れましょう