Seminar Report On Cryptocurrency: Bachelor of Computer Application

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

SEMINAR REPORT ON

CRYPTOCURRENCY
IN PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE OF

BACHELOR OF COMPUTER APPLICATION


SUBMITTED BY

AHAMED JABIR P.A (REG NO: 190021094124)

UNDER THE GUIDANCE OF


Mrs. RASMI SASIDHARAN

2019-2022
DEPARTMENT OF COMPUTER SCIENCE

ARAFA COLLEGE OF ARTS AND SCIENCE

(AFFILIATED TO MAHATMA GANDHI UNIVERSITY)


PEZHAKKAPPILY, MUVATTUPUZHA

PIN: 686673
ARAFA COLLEGE OF ARTS AND SCIENCE

PEZHAKKAPPILLY

(AFFILIATED TO MAHATMA GANDHI UNIVERSITY )

CERTIFICATE
This is to certify that this seminar work entitled “CRYPTOCURRENCY” is a bonafide work
done by “AHAMED JABIR P.A”, (Reg. No: 190021094124) submitted in partial fulfillment
for the degree of BACHELOR OF COMPUTER APPLICATION of MAHATMA GANDHI
UNIVERSITY, KOTTAYAM during the academic year 2019-2022.

INTERNAL GUIDE HOD PRINCIPAL

COLLEGE SEAL

SUBMITTED FOR THE SEMINAR EVALUVATION HELD ON………………………

Internal Examiner
ARAFA COLLEGE OF ARTS AND SCIENCE

PEZHAKKAPPILLIY
(AFFILIATED TO MAHATMA GANDHI UNIVERSITY)

BONAFIDE CERTIFICATE
This is to certify that the seminar work entitled "CRYPTOCURRENCY” submitted to
MAHATMA GHANDHI UNIVERSITY in partial fulfillment of the requirements for the
award of the Degree of Bachelor of Computer Application is a record of the original work
done by “AHAMED JABIR P.A” under my supervision and guidance and that this seminar
work has not formed the basis for the award of any Degree/Diploma/Fellowship or similar title to
any candidates of any University.

INTERNAL GUIDE HOD PRINCIPAL

COLLEGE SEAL

INTERNAL EXAMINER
DECLARATION
I hereby declare that the seminar work entitled “CRYPTOCURRENCY” submitted in the
partial fulfillment of the requirement for the award of BACHELOR OF COMPUTER
APPLICATION of M.G UNIVERSITY, KOTTAYAM is a report of original work done by
me during the period of study at Arafa College Of Arts And Science, Muvattupuzha under the
supervision and guidance of Mrs. RASMI SASIDHARAN, Department Of Computer
Science.

Place: AHAMED JABIR P. A

Date:
ACKNOWLEDGEMENT

If words are considered as symbols of approval and tokens of acknowledgement then words play
the heralding role of expressing our gratitude.

First of all, I thank GOD Almighty, the guiding light of our life, for giving me the strength and
courage to complete this seminar successfully.

I express my heartfelt gratitude to SREEKALA.S Principal, Arafa College Of Arts And


Science, Pezhakkappilly under whose valuable guidance I have been fortunate to study in this
college.

I am deeply indebted to Mrs. NEETHUMOL L. P, HOD, and Department of Computer


Science for her valuable guidance throughout my seminar and being sources of inspiration to me
throughout my study in this college.

I extend my deep gratitude and heartfelt thanks to Mrs. RASMI SASIDHARAN Asst.
Professor, Department of Computer Science, for rendering me help and immense
encouragement.

Here, I am also wish to thank my family members, friends and all those who either directly or
indirectly help me in this endeavor.

AHAMED JABIR P.A


CONTENTS

1. Introduction ............................................................................................................ 1
1.1 Block Chain .................................................................................................. 2
1.2 Merkle Patricia Tree ..................................................................................... 3
1.3 The Process of Mining ................................................................................. 3
1.4 Hash Algorithms .......................................................................................... 4
1.4.1 Bitcoin uses Hashcash (the algorithm used in SHA 256) ...................4
1.4.1 Etherium uses ETHash ........................................................................ 4
1.4.1 LitCoin uses Scrypt ............................................................................. 4
2. Algorithms ............................................................................................................... 5
2.1 Hash Algorithms .......................................................................................... 6
2.1.1 SHA256 ............................................................................................ 6
2.1.2 EtHash .............................................................................................. 7
2.1.3 Scrypt............................................................................................... 8
3. Advantages/Disadvantages .................................................................................... 9
3.1 Bitcoin ........................................................................................................ 10
3.1.1 Advantages ........................................................................................ 10
3.1.2 Disadvantages.................................................................................... 11
3.2 Ethereum .................................................................................................... 13
3.2.1 Advantages ....................................................................................... 13
3.2.2 Disadvantages................................................................................... 15
3.3 Litecoin....................................................................................................... 15
3.3.1 Advantages ...................................................................................... 15
3.3.2 Disadvantages.................................................................................. 16
4. Applications........................................................................................................... 17
5. Conclusion and Future Scope .............................................................................. 19
5.1 Conclusion ........................................................................................................ 20
5.1 Future Scope ..................................................................................................... 20
6. References ............................................................................................................. 21
1

1. INTRODUCTION

Cryptocurrency Department of Computer Science


2

1. INTRODUCTION

Cryptocurrency is a digital or virtual currency; its money balance record is stored


electronically. The concept of digital currency existed as early as 1983, but its first practical
use was made in 1990 when David Chaum founded Digi Cash, an electronic cash company.
In between 1990 and 2008 there were companies like PayPal and e-gold that used the
concept of digital currencies. But it was not until 2009 that virtual currencies were
recognized globally. In 2009, Satoshi Nakamoto (possibly an alias) designed a
cryptocurrency called Bitcoin which began an evolution in the field of digital currency.
Bitcoin was the first decentralized currency.
Cryptocurrencies are a peer-to-peer digital exchange system where cryptography is
used to generate and distribute currency units.
To avoid any central authority, this process requires distributed varication of
trans actions. This can be done by a process called mining. Mining is a process where we
ensure that the payer has the currency that they are trying to spent, also to ensure that the
currency is not spent twice. Various cryptocurrencies are created to satisfy various
purposes, for example some cryptocurrencies focus on restricting the number of
transactions that are validated per unit time, while others focus on achieving fast,
lightweight services. We shall be surveying or comparing three different cryptocurrency
systems i.e. bitcoin, Ethereum and Litecoin.
A cryptocurrency is formed by a process called mining, this process involves
verification and validation of information. Once the verification and validation of
information is completed a new block is added to a chain called the blockchain. A
blockchain is a distributed public ledger that is basically used for maintaining the integrity
of decentralized cryptocurrency. This blockchain is stored in the data structure called
Merkle Particia tree. The concept of mining, blockchain and Merkle Particia are explained
in brief below.
1.1 Blockchain:
Each verified transaction is put together or accumulated in a block, this block is
also known as blockchain. A blockchain is a ledger that is public and each cryptocurrency

Cryptocurrency Department of Computer Science


3

has its own public ledger. The maximum size of a block differs from cryptocurrency to
cryptocurrency. But each cryptocurrency has its own upper bound for each block. For
example, the maximum size of a bitcoin block is 1MB. Bitcoin and Litecoin consists of fi
elds in its block, namely:
1. Magic Number
2. Block Size
3. Block Header
4. Transaction Counter
5. Transactions

1.2 Merkle Patricia tree:


A hash tree or Merkle tree is a tree in which every leaf node is labelled with the
hash of a data block and every non-leaf node is labelled with the cryptographic hash of the
la bels of its child nodes. Hash trees allow efficient and secure verification of the
con tents of large data structures. Hash trees are a generalization of hash lists and hash
chains. Merkle Patricia tree is used to verify the integrity of transactions within a block.
Transactions are hashed and concatenated repeatedly until one hash is left, i.e., Merkle
root. Merkle root is a single hash combines all transactions included in a block, it is kept
in the block header and used by SPV clients to verify transactions without the need to
download the whole blockchain.
The MPT is a hash of hashes and has the following functions:

1. Storing key-value key-value data of any length


2. Providing a mechanism for quickly calculating the hash of the maintenance data
set
3. Providing a fast state the rolling mechanism
4. Providing a method called Merkel proof
5. Lightweight expanded node
6. Simple payment verification

Cryptocurrency Department of Computer Science


4

1.3 The Process of Mining:


Almost all the cryptocurrencies i.e. bitcoin, Litecoin, namecoin, peercoin etc, use
the distributed public ledger called Blockchain, which is stored in a data structure called
Merkle Patricia tree. When a payer sends some currency to the payee a transaction is
created. Once mining validates the transaction it is added to the public ledger. While a
transaction is taking place a miner will check that the currency belongs to the payer or
if the payer is trying to double spend. Malicious users may create multiple nodes and
try to validate an invalid transaction, since the ownership of the currency is available
in the Blockchain.
To prevent such malicious users, miners have to solve a resource intensive task.
Resource intensive task can be any of the following:
1. Proof of Work
2. Proof of Stake
3. Proof of Retrievability

1.4 Hash Algorithms:


The three cryptocurrencies in discussion are: bitcoin, Ethereum and Litecoin all three
coins use different hashing algorithms.
1.4.1 Bitcoin uses Hash Cash(the algorithm used in SHA 256): It is a secure
hash function which contains six different algorithms that produce results of
different lengths. SHA 256 produces a result of 256 bits, it also satisfies
unidirectional hashes.
1.4.2 Ethereum uses EtHash: This algorithm is exclusive for Ethereum. This
algorithm was designed to prevent the dominance of ASICs over CPUs and
GPUs. The verification of correctness for the proof of work is very fast in this
algorithm.
1.4.3 Litecoin uses Script: It was designed to perform as a key derivation
function. It takes an input and then generates a large vector of pseudo-random
bits. This algorithm requires large memory.

Cryptocurrency Department of Computer Science


5

2. ALGORITHMS

Cryptocurrency Department of Computer Science


6

2. ALGORITHMS

2.1 Hash algorithms:

It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed
size (a hash) and is designed to be a one-way function, that is, a function which is
infeasible to invert. The only way to recreate the input data from an ideal cryptographic
hash functions output is to attempt a brute force search of possible inputs to see if they
produce a match.

2.1.1 SHA256: SHA 256 is a set of Secure Hash Functions that has six
algorithms, which produce digests (results) that are of different bit lengths.
SHA 256, produces a digest of 256 bits. SHA 256 satisfies the requirement
of unidirectional hashes (that is, any change in the input, however
insignificant, leads to a completely different hash, and determining the input
from the hash is practically impossible). Also, the same input will always
produce the same digest. SHA 256 pads input to convert its length to a
multiple of 512 bits. Then, it divides the input into blocks of 512 bits each.

The round function of SHA-256 is as follows: The XOR of the following three quantities:
• the fifth word in the block rotated right 6 places
• that word rotated right 11 places
• that word rotated right 25 places

Figure 2.1: Flowchart for the working of SHA256

Cryptocurrency Department of Computer Science


7

2.1.2 EtHash:

EtHash is the poof-of-work function in Ethereum-based blockchain currencies. It


was designed to thwart the dominance of ASICs vis a vis CPUs and GPUs. The
verification of correctness of this proof of work is fast, taking .01 seconds for a light
client.
The general route that the algorithm takes is as follows:
• There exists a seed which can be computed for each block by scanning through
the block headers up until that point.
• From the seed, one can compute a 16 MB pseudo random cache. Light clients
store the cache.
• From the cache, we can generate a 1 GB data set, with the property that each item
in the data set depends on only a small number of items from the cache. Full clients
and miners store the data set. The data set grows linearly with time.
• The large data set is updated once every 30000 blocks, so the vast majority of a
miner’s effort will be reading the data set, not making changes to it.

The large data set is updated once every 30000 blocks, so the vast majority of a
miner’s effort will be reading the data set, not making changes to it.

Figure 2.2: Flowchart for the working of EtHash

Cryptocurrency Department of Computer Science


8

2.1.3 Scrypt
Scrypt was designed to be a Key-Derivation Function (KDF). All Key-Derivation
Functions are resource intensive in order to mitigate large-scale custom hardware attacks.
Scrypt takes an input and generates a large vector of pseudo-random bits. Since
these vectors are generated at runtime, the algorithms require large memory. More memory
leads to faster computation. Within the algorithm, there are two functions called Smix and
Blockmix. Blockmix performs permutation operations on the input blocks using binary
logic operands and, in each iteration, the output of the Block mix is again processed in
Smix, which performs bitwise permutations. Scrypt was modified for the purposes of
mining. Since the original Scrypt uses pseudo-random bits, the outputs of the same input
would be different. This makes it harder to verify. When Scrypt was used for KDF, there
was no need for such verification.

Figure 2.3: Flowchart of the working of Scrypt

Cryptocurrency Department of Computer Science


9

3. ADVANTAGES/DISADVANTAGES

Cryptocurrency Department of Computer Science


10

3.ADVANTAGES/DISADVANTAGES

3.1 Bitcoin:
3.1.1 Advantages:
• Freedom in Payment
– With Bitcoin it is very possible to be able to send and get money anywhere
in the world at any given time.
– You don’t have to worry about crossing borders, rescheduling for bank
holidays, or any other limitations one might think will occur when
transferring money.
– You are in control of your money with Bitcoin. There is no central
authority figure in the Bitcoin network.

• Control and Security


– Allowing users to be in control of their transactions help keep Bitcoin safe
for the network.
– Merchants cannot charge extra fees on anything without being noticed.
They must talk with the consumer before adding any charges.
– Payments in Bitcoin can be made and finalized without one’s personal
information being tied to the transactions.
– Due to the fact that personal information is kept hidden from prying eyes,
Bitcoin protects against identity theft.
– Bitcoin can be backed up and encrypted to ensure the safety of your
money.
• Information is Transparent
– With the block chain, all finalized transactions are available for everyone
to see, however personal information is hidden.
– Your public address is what is visible; however, your personal information
is not tied to this.
– Anyone at any time can verify transactions in the Bitcoin block chain.

Cryptocurrency Department of Computer Science


11

– Bitcoin protocol cannot be manipulated by any person, organization, or


government. This is due to Bitcoin being cryptographically secure.
• Very Low Fees
– Currently there are either no fees, or very low fees within Bitcoin
payments.
– With transactions, users might include fees in order to process the
transactions faster. The higher the fee, the more priority it gets within the
network and the quicker it gets processed.
– Digital Currency exchanges help merchant process transactions by
converting Bitcoins into fiat currency. These services generally have lower
fees than credit cards and PayPal.
• Fewer Risks for Merchants
– Due to the fact that Bitcoin transactions cannot be reversed, do not carry
with them personal information, and are secure, merchants are protected
from potential losses that might occur from fraud.
– With Bitcoin, merchants are able to do business where crime rates and
fraud rates may be high. This is because it is very hard to cheat or con
anyone in Bitcoin due to the public ledger, otherwise known as the block
chain.
3.1.2 Disadvantages:
• Lack of Awareness Understanding
– Fact is many people are still unaware of digital currencies and Bitcoin.
– People need to be educated about Bitcoin to be able to apply it to their
lives.
– Networking is a must to spread the word on Bitcoin.
– Businesses are accepting Bitcoins because of the advantages, but the list
is relatively small compared to physical currencies. – Companies like Tiger
direct and Overstock accepting Bitcoin as payment is great. However, if
they do not have a knowledgeable staff that understands digital currencies,
how will they help customers understand and use Bit coin for transactions?
– The workers need to be educated on Bitcoin so that they can help the

Cryptocurrency Department of Computer Science


12

customers. This will definitely take some time and effort. Otherwise, what
is the benefit of such large companies accepting Bitcoin if its staff doesnt
even know what digital currencies are?

Risk and Volatility


– Bitcoin has volatility mainly due to the fact that there is a limited amount
of coins and the demand for them increases by each passing day.
– However, it is expected that the volatility will decrease as more time goes
on.
– As more businesses, medias, and trading centers begin to accept Bitcoin,
its price will eventually settle down.
– Currently, Bitcoins price bounces everyday mainly due to current events
that are related to digital currencies. Still Developing
– Bitcoin is still at its infancy stage with incomplete features that are in
development.
– To make the digital currency more secure and accessible, new features,
tools, and services are currently being developed.
– Bitcoin has some growth to do before it comes to its full and final
potential.
– This is because Bitcoin is just starting out, and it needs to work out its
problems just like how any currency in its beginning stage would need to
further development.

Still Developing
– Bitcoin is still at its infancy stage with incomplete features that are in
development.
– To make the digital currency more secure and accessible, new features,
tools, and services are currently being developed.
– Bitcoin has some growth to do before it comes to its full and final
potential.

Cryptocurrency Department of Computer Science


13

– This is because Bitcoin is just starting out, and it needs to work out its
problems just like how any currency in its beginning stage would need to
further development.
3.2 Ethereum:
3.2.1 Advantages:
• The mining process:
The mining process is the first point that stands out to those who prefer
Ethereum. You can mine ethers using graphics processing units (GPUs), also
known simply as graphic cards. The process is different from Bitcoin mining,
which uses the more expensive customized application-specific integrated
circuits (ASICs). Indeed, owing to its ever-growing cost, Bitcoin mining has
become the preserve of companies backed by venture capitalists. The Ethereum
community is considering doing away with the proof-of-work (POW)
consensus-making protocol on which Bitcoin is run. They want to replace it
with proof of stake (POS), which only require users to hold in stake the amount
of ether necessary for mining, instead of requiring people to buy expensive,
specialized hardware and pay for large amounts of electricity.

• Unconstrained block size:


The constrained Bitcoin block size has been a source of contention within
the Bitcoin community. It has led some like Mike Hearn, a former core
developer, to declare Bitcoin a failed experiment. Satoshi Nakamoto capped the
Bitcoin block size at one megabyte to protect the network from DDOS attacks.
However, with growing mass adoption, the safety measure is turning out to be
an obstacle. Furthermore, with no governance structure, the community is
finding it hard to agree on how to scale Bitcoin’s block size. Ethereum doesn’t
have a capped block size. Blocks expand and shrink depending on the need at
hand. This opens the cryptocurrency up for mass adoption, with little need for
tweaking.

Cryptocurrency Department of Computer Science


14

• Faster transactions:
The Ethereum network, on its part, confirms a transaction in about 14
seconds. Closely related to the block size is the time the network takes to confirm
a transaction. The Bitcoin network takes about ten minutes. Occasionally it
might run into hours. Or even days. This works against Bitcoin’s adoption. The
delays especially make it inconvenient as a payment method. Users don’t want
to wait longer at checkout for the network to confirm a transaction, just so they
can purchase a bottle of soda. The Ethereum network, on its part, confirms a
transaction in about 14 seconds. This makes the ether a more convenient method
of payment.

• More applications accommodated:


Ethereum’s founder, Vitalik Buterin, designed the platform with many of
Bitcoin’s limitations in mind. In one post, he said Bitcoin was intended to be a
simple mail transfer protocol (SMTP) for digital value. He wrote: It’s a protocol
that is very good at one particular task. It is good for moving money, but it was
not designed as a foundational layer for any kind of protocols to be built on top.
Instead of being just a virtual currency, Ethereum is a virtual machine on which
you can run various applications. Making this possible is its feature of being
Turing complete, which gives it unlimited resources to accommodate the
execution of infinite loops. Indeed, Vitalik has in the past said that Ethereum
does not have features; it just has a programming language.
• Lighter to run:
Ethereum’s blockchain is lighter than Bitcoins. This is not because the
former is younger than the latter, but because Bitcoins blockchain is growing by
approximately three gigabytes per month, while Ethereum’s averages one
gigabyte in the same period. Keeping the transactional history of Ethereum on
your desktop will always be easier than storing Bitcoin’s history. This is
especially important when you consider that cryptocurrencies are supposed to be
decentralized and free from control by gatekeepers. The bulkiness of Bitcoin
makes it hard for everyone to be part of the network. Only those with enough
resources can take part in the system that maintains and secures the services, and

Cryptocurrency Department of Computer Science


15

this leads to the problem of centralization. Indeed, Ethereum is full of features


that will never be implemented on the Bitcoin blockchain. It has the potential to
give users a wide range of experiences beyond what Bitcoin offers.

3.2.2 Disadvantage:
Ethereum also has its downsides. One is security risk. This has already been
witnessed with the theft in June of close to USD 60 million from the DAO, the
first decentralized anonymous organization to be built on the Ethereum
blockchain. Ethereum also has its downsides. One is security risk. Ethereum
also has features that make it weaker than Bitcoin. For one example, Bitcoin is
deflationary, meaning the highest number of Bitcoins that will ever be placed
in circulation is capped at 21 million. Ether, on the other hand, is inflationary,
meaning it can have an infinite supply.
3.3 Litecoin
3.3.1 Advantages
• Faster transaction times
• Less expensive transactions
• First to successfully implement Lightning network for instant, zero-fee
transactions
• First to complete a cross-chain atomic swap (with Decred)
• In the process of adding confidential transactions
• Faster to adopt new technology, without community infighting over upgrades.

There will be 4x as many Litecoin’s produced than Bitcoins. As Bitcoin’s


limit is set to 21 million and Litecoin’s is set to 84 million. So the coins should
be cheaper, more widespread and easier to acquire. In order to create Litecoin’s
you need a computer with a powerful graphics card (GPU) not just faster
processing chips (which is the way with Bitcoins), this is because the algorithms
used to create Litecoin’s are more memory intensive than processor intensive.
What this means is that instead of a few people with specialist computers

Cryptocurrency Department of Computer Science


16

mining the coins, Litecoin’s can be mined by a wider base of users, for example
a PC built for gaming would be perfect for mining Litecoin’s.
The time it takes to officially confirm a Bitcoin transaction has taken place
is 10 minutes, and for a Litecoin it’s just 2 and a half minutes, meaning
purchases online or in stores can be performed much faster.

3.3.2 Disadvantages
Currently very few stores accept payment in Litecoin’s, though this is
changing by the day.
Litecoin’s are still relatively unknown compared to Bitcoins. This is mainly
due to there being no central Litecoin authority.
The largest virtual currency trading websites still don’t support Litecoins.
Though this should change in the near future.

Cryptocurrency Department of Computer Science


17

4. APPLICTAIONS

Cryptocurrency Department of Computer Science


18

4. APPLICTAIONS
Cryptocurrency is a form of digital money that is designed to be secure and, in
many cases, anonymous. It is a currency associated with the internet that uses
cryptography, the process of converting legible information into an almost uncrackable
code, to track purchases and transfers. Cryptography was born out of the need for secure
communication in the Second World War. It has evolved in the digital era with elements
of mathematical theory and computer science to become a way to secure communications,
information and money online.
It has various applications:
• Payments can be performed with ease; money can be transferred hassle free
without any losses.
• Inter-company transactions can be easily performed.
• Cryptocurrencies like Ethereum can be used for keeping track of contracts, it has
a system called smart contracts which can keep track of and validate contracts.
• Faster international transactions, which are free of cost.

Figure 4.1: Applications of Cryptocurrencies

Cryptocurrency Department of Computer Science


19

5. CONCLUSION AND FUTURE SCOPE

Cryptocurrency Department of Computer Science


20

5.CONCLUSION AND FUTURE SCOPE

5.1 Conclusion
Thus, we understood the working of cryptocurrencies, the various domains
it can be used in other than as an alternative payment. We also acquainted ourselves
with the concept of mining and how a currency is formed. We understood the
various security issues and how implementation of blockchain prevents malicious
users from using the system in their advantage. We finally understood the various
hashing algorithms and the resource intensive tasks.

5.2 Future Scope

• Cryptocurrencies could be widely used in the domain of smart contracts.


• It could also become a recognized currency which could later be used for free
transactions.
• With the introduction of cryptocurrencies like Dash and Zcash, which use
anonymity in blockchain, the use of cryptocurrency may see and increase.

Cryptocurrency Department of Computer Science


21

6. REFERENCES

Cryptocurrency Department of Computer Science


22

6.REFERENCES
[1] Mukhopadhyay, Ujan, et al. A Brief Survey of Cryptocurrency Systems. 2016 14th
Annual Conference on Privacy, Security and Trust (PST), 2016
[2] Watanabe, Hiroki, et al. Blockchain Contract: A Complete Consensus using Blockchain
, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)
[3] Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [4] Understanding
the Ethereum Trie. Easy There Entropy, 27 Aug. 2015,
easythereentropy.wordpress.com/2014/06/04/understanding-the-ethereum trie/.
[5] Merkle Patricia Tree - Steemit. - Steemit, Nadifsd, 1 Oct. 2017,
steemit.com/cryptocurrency/@nadifsd/merkle-patricia-tree.
[6] Ethereum/Wiki. GitHub, Dwardu, 19 Dec. 2017,
github.com/ethereum/wiki/wiki/Problems. [7] 1 And SHA-256. Description of SHA,
quadibloc.com/crypto/mi060501.html.

Cryptocurrency Department of Computer Science


23

Cryptocurrency Department of Computer Science

You might also like