일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 |
- hardhat
- concept
- error
- tailwindcss
- CLASS
- nextJS
- useState
- built in object
- API
- web
- Interface
- evm
- 기준
- middleware
- bitcoin
- graphQL
- solidity
- HTML
- CSS
- 삶
- Ethereum
- node.js
- express.js
- SSR
- blockchain
- Props
- typeScript
- Redux
- REACT
- JavaScript
- Today
- Total
목록bitcoin (7)
ReasonJun

Block Structure (Size : 1MB) Size Field Description 4 bytes Block Size Size of Block 80 bytes Block Header Block Header Info 1 ~ 9 bytes Transaction Counter Number of transactions in the current block (0 ~ 3000) Variable Transaction Transaction list in Block Block Header Structure Size Field Description 4 bytes Version version info (95%^ => 2016 Block Upgrade) 32 bytes Previous Block Hash Previo..

The reason why Gossip Protocol (TCP) is used is that when a transaction occurs, it must be able to push even if there is no request. When a transaction occurs in one node, the information must be spread to other nodes as quickly and widely as possible. At this time, whether each transaction is correct is determined by the basic rules and consensus algorithm of the Bitcoin network. Join a network..

A Merkle Tree, often referred to simply as a Merkle Tree or a hash tree, is a fundamental data structure used in Bitcoin and other blockchain systems to efficiently represent and verify the integrity of a large set of data, such as transactions in a block. The Merkle Tree is named after its inventor, Ralph Merkle. Here's how it works in the context of Bitcoin: Structure of a Merkle Tree: A Merkl..
What is ECDSA? ECDSA is a public-key digital signature algorithm that provides a secure way to verify the authenticity and integrity of digital messages or documents. It is based on elliptic curve cryptography (ECC), which is known for its efficiency and security. Here's how ECDSA works: Key Generation: A user generates a pair of cryptographic keys: a private key (known only to the owner) and a ..
RSA (Rivest–Shamir–Adleman): RSA is a widely used public-key cryptosystem for encryption and digital signatures. It relies on the mathematical properties of large prime numbers. Here's a simplified explanation of how RSA works: Key Generation: Choose two large prime numbers, p and q. Compute their product, n = p * q. Calculate φ(n) = (p - 1) * (q - 1), where φ is Euler's totient function. Select..

Incentive → By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. → The incentive can also be funded with transaction fees. → Once a predetermined..