NDCoin and Cryptographic Currency Application

نویسنده

  • Sathvik Palakurty
چکیده

................................................................................................................................................. 2 Why digital cash? .................................................................................................................................... 2 Fiat Currency ........................................................................................................................................... 2 Past Digital Cash Restrictions ................................................................................................................... 3 Bitcoin ..................................................................................................................................................... 3 Transactions ............................................................................................................................................ 3 The Blockchain ........................................................................................................................................ 4 Dynamic Difficulty ................................................................................................................................... 4 Attacks to System .................................................................................................................................... 4 Bitcoin Intrinsic Value .............................................................................................................................. 5 SHA256 ................................................................................................................................................... 5 Scrypt ...................................................................................................................................................... 5 Darkcoin .................................................................................................................................................. 6 Ethereum ................................................................................................................................................ 7 Turing Machine on Encrypted Data .......................................................................................................... 7 NDCoin .................................................................................................................................................... 8 PitCoin .................................................................................................................................................... 8 The Future ............................................................................................................................................... 9 References .............................................................................................................................................. 9

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Bitcoin Security in the Presence of Broken Crypto Primitives

Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break frequently, and motivate the development of new ones. It is therefore crucial for maintaining trust in a crypto currency to anticipate such breakage. We pr...

متن کامل

The promise and perils of digital currencies

Interest in digital currencies, especially Bitcoin, has exploded over the past year. The cryptocurrency Bitcoin was created in 2009 by an anonymous entity operating under the pseudonym Satoshi Nakamoto. Using cryptographic primitives to create a digital currency is not particularly new – David Chaum proposed electronic cash nearly thirty years ago. What is different about Bitcoin is its success...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Bitter to Better - How to Make Bitcoin a Better Currency

Bitcoin is a distributed digital currency which has attracted a substantial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment. We ask also how Bitcoin could become a good candidate for a long-lived stable currency. In doing so, we identify several issues ...

متن کامل

Reconfigurable random bit storage using polymer-dispersed liquid crystal

We present an optical method of storing random cryptographic keys, at high densities, within an electronically reconfigurable volume of polymer-dispersed liquid crystal (PDLC) film. We demonstrate how temporary application of a voltage above PDLC’s saturation threshold can completely randomize (i.e., decorrelate) its optical scattering potential in less than a second. A unique optical setup is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014