일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 | 31 |
- Ethereum
- 삶
- node.js
- Props
- typeScript
- SSR
- middleware
- Redux
- REACT
- graphQL
- useState
- web
- express.js
- 기준
- evm
- Interface
- tailwindcss
- API
- CLASS
- hardhat
- concept
- error
- JavaScript
- nextJS
- blockchain
- HTML
- solidity
- built in object
- CSS
- bitcoin
- Today
- Total
목록Blockchain (89)
ReasonJun
The reason why Gossip Protocol (TCP) is used is that when a transaction occurs, it must be able to push even if there is no request. When a transaction occurs in one node, the information must be spread to other nodes as quickly and widely as possible. At this time, whether each transaction is correct is determined by the basic rules and consensus algorithm of the Bitcoin network. Join a network..
gRPC and HTTP API are two different technologies used for building and interacting with APIs (Application Programming Interfaces). They have distinct characteristics and use cases: gRPC: Definition: gRPC stands for "Google Remote Procedure Call." It is an open-source RPC (Remote Procedure Call) framework developed by Google. Communication Protocol: gRPC uses HTTP/2 as its underlying communicatio..
A Merkle Tree, often referred to simply as a Merkle Tree or a hash tree, is a fundamental data structure used in Bitcoin and other blockchain systems to efficiently represent and verify the integrity of a large set of data, such as transactions in a block. The Merkle Tree is named after its inventor, Ralph Merkle. Here's how it works in the context of Bitcoin: Structure of a Merkle Tree: A Merkl..
What is ECDSA? ECDSA is a public-key digital signature algorithm that provides a secure way to verify the authenticity and integrity of digital messages or documents. It is based on elliptic curve cryptography (ECC), which is known for its efficiency and security. Here's how ECDSA works: Key Generation: A user generates a pair of cryptographic keys: a private key (known only to the owner) and a ..
RSA (Rivest–Shamir–Adleman): RSA is a widely used public-key cryptosystem for encryption and digital signatures. It relies on the mathematical properties of large prime numbers. Here's a simplified explanation of how RSA works: Key Generation: Choose two large prime numbers, p and q. Compute their product, n = p * q. Calculate φ(n) = (p - 1) * (q - 1), where φ is Euler's totient function. Select..
Incentive → By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. → The incentive can also be funded with transaction fees. → Once a predetermined..