1. Introduction
  2. 1. Learning Paths
    1. 1.1. Learning about Blockchain Basics
    2. 1.2. Learning about Mimblewimble Implementation
    3. 1.3. Learning about Bulletproofs
  3. 2. Cryptography
    1. 2.1. Elliptic Curves 101
    2. 2.2. Introduction to Schnorr Signatures
    3. 2.3. Introduction to Scriptless Scripts
    4. 2.4. The MuSig Schnorr Signature Scheme
    5. 2.5. Fraud Proofs
    6. 2.6. Bulletproofs and Mimblewimble
    7. 2.7. Building on Bulletproofs
    8. 2.8. The Bulletproof Protocols
    9. 2.9. Pure-Rust Elliptic Curve Cryptography
    10. 2.10. zk-SNARKs
    11. 2.11. Rank-1 Constraint System with Application to Bulletproofs
    12. 2.12. Amortization of Bulletproofs Inner-Product Proof
    13. 2.13. Trustless Recursive Zero-Knowledge Proofs
  4. 3. Consensus Mechanisms
    1. 3.1. Understanding BFT Consensus
    2. 3.2. BFT Consensus Mechanisms
    3. 3.3. Introduction to Applications of Byzantine Consensus Mechanisms
  5. 4. Scaling
    1. 4.1. Layer 2 Scaling Survey
    2. 4.2. Layer 2 Scaling Survey Executive Summary
    3. 4.3. Directed Acyclic Graphs
    4. 4.4. Laser Beam
  6. 5. Merged Mining
    1. 5.1. Merged Mining Introduction
  7. 6. Digital Assets
    1. 6.1. Application of Howey to Blockchain Network Token Sales
    2. 6.2. Non-fungible Tokens Survey
    3. 6.3. Confidential Assets
  8. 7. Protocols
    1. 7.1. Mimblewimble A High-Level Overview
    2. 7.2. Mimblewimble Transactions Explained
    3. 7.3. Mimblewimble-Grin Block Chain Protocol Overview
    4. 7.4. Grin vs. BEAM; a Comparison
    5. 7.5. Grin Design Choice Criticisms - Truth or Fiction
    6. 7.6. Atomic Swaps
    7. 7.7. Lightning Network for Dummies
    8. 7.8. Introduction to SPV, Merkle Trees and Bloom Filters
    9. 7.9. The RGB Protocol - An Introduction
    10. 7.10. Introduction to Tor and I2P
    11. 7.11. Distributed Hash Tables
    12. 7.12. Mimblewimble Multiparty Bulletproof UTXO
  9. 8. Network Analysis
    1. 8.1. Probabilistic Attack Vector Analysis Building Blocks
    2. 8.2. Probability of a Byzantine Takeover of the Digital Assets Network
  10. 9. Labs
    1. 9.1. Mermaid Demonstration
    2. 9.2. Notes and info boxes

Introduction to SPV, Merkle Trees and Bloom Filters

Having trouble viewing this presentation?

View it in a separate window.