Introduction
1.
Learning Paths
1.1.
Learning about Blockchain Basics
1.2.
Learning about Mimblewimble Implementation
1.3.
Learning about Bulletproofs
2.
Cryptography
2.1.
Elliptic Curves 101
2.2.
Introduction to Schnorr Signatures
2.3.
Introduction to Scriptless Scripts
2.4.
The MuSig Schnorr Signature Scheme
2.5.
Fraud Proofs
2.6.
Bulletproofs and Mimblewimble
2.7.
Building on Bulletproofs
2.8.
The Bulletproof Protocols
2.9.
Pure-Rust Elliptic Curve Cryptography
2.10.
zk-SNARKs
2.11.
Rank-1 Constraint System with Application to Bulletproofs
2.12.
Amortization of Bulletproofs Inner-Product Proof
2.13.
Trustless Recursive Zero-Knowledge Proofs
3.
Consensus Mechanisms
3.1.
Understanding BFT Consensus
3.2.
BFT Consensus Mechanisms
3.3.
Introduction to Applications of Byzantine Consensus Mechanisms
4.
Scaling
4.1.
Layer 2 Scaling Survey
4.2.
Layer 2 Scaling Survey Executive Summary
4.3.
Directed Acyclic Graphs
4.4.
Laser Beam
5.
Merged Mining
5.1.
Merged Mining Introduction
6.
Digital Assets
6.1.
Application of Howey to Blockchain Network Token Sales
6.2.
Non-fungible Tokens Survey
6.3.
Confidential Assets
7.
Protocols
7.1.
Mimblewimble A High-Level Overview
7.2.
Mimblewimble Transactions Explained
7.3.
Mimblewimble-Grin Block Chain Protocol Overview
7.4.
Grin vs. BEAM; a Comparison
7.5.
Grin Design Choice Criticisms - Truth or Fiction
7.6.
Atomic Swaps
7.7.
Lightning Network for Dummies
7.8.
Introduction to SPV, Merkle Trees and Bloom Filters
7.9.
The RGB Protocol - An Introduction
7.10.
Introduction to Tor and I2P
7.11.
Distributed Hash Tables
7.12.
Mimblewimble Multiparty Bulletproof UTXO
8.
Network Analysis
8.1.
Probabilistic Attack Vector Analysis Building Blocks
8.2.
Probability of a Byzantine Takeover of the Digital Assets Network
9.
Labs
9.1.
Mermaid Demonstration
9.2.
Notes and info boxes
Light
(default)
Rust
Coal
Navy
Ayu
Elliptic curves 101
Having trouble viewing this presentation?
View it in a
separate window
.