Episódo 9 - Como funciona o Bitcoin e introdução à Post Quantum Blockchains
Artikel konnten nicht hinzugefügt werden
Der Titel konnte nicht zum Warenkorb hinzugefügt werden.
Der Titel konnte nicht zum Merkzettel hinzugefügt werden.
„Von Wunschzettel entfernen“ fehlgeschlagen.
„Podcast folgen“ fehlgeschlagen
„Podcast nicht mehr folgen“ fehlgeschlagen
-
Gesprochen von:
-
Von:
Über diesen Titel
Referências:
Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System.” (2008).
Grunspan, Cyril, and Ricardo Pérez-Marco. "The mathematics of Bitcoin." European Mathematical Society Magazine 115 (2020): 31-37.
Loc Phan Van e Viet Nguyen Quoc, Android Security Research: Crypto WalletLocal Storage Attack, Google Hacking Database, 22 Feb. 2019.
Aliffi, Davide, and Beatrice Bertani. "La crittografia nel sistema di moneta digitale Bitcoin”, 2013.
Wiesner, Stephen. “Conjugate coding.” SIGACT News 15 (1983): 78-88.
Bennett, Charles H. and Gilles Brassard. “Quantum cryptography: Public key distribution and coin tossing.” Theor. Comput. Sci. 560 (2014): 7-11.
Bennett et al. “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.” Physical review letters 70 13 (1993): 1895-1899 .
Eberhard, Phillippe H., and Ronald R. Ross. "Quantum field theory cannot provide faster-than-light communication." Foundations of Physics Letters 2.2 (1989): 127-149.
Lloyd, Seth, et al. "Infrastructure for the quantum Internet." ACM SIGCOMM Computer Communication Review 34.5 (2004): 9-20.
Wehner, Stephanie, David Elkouss, and Ronald Hanson. "Quantum internet: A vision for the road ahead." Science 362.6412 (2018): eaam9288.
Giovannetti, Vittorio, Seth Lloyd, and Lorenzo Maccone. "Quantum random access memory." Physical review letters 100.16 (2008): 160501.
Gyongyosi e Imre, Entanglement concentration service for the quantum Internet, Quantum Information Processing (2020) 19:22, https://doi.org/10.1007/s11128-020-02716-3.
Koziel, Brian et al. “SIKE’d Up: Fast Hardware Architectures for Supersingular Isogeny Key Encapsulation.” IEEE Transactions on Circuits and Systems I: Regular Papers 67 (2020): 4842-4854.
Notícias usadas:
MÁIRON, TIBIA: JOGADOR REVELA COMO SUSTENTA SUA FAMÍLIA NA VENEZUELA APENAS VENDENDO MOEDA DO JOGO, MMORPGBR, Maio de 2020.
1. ANA BERMAN, Ledger Discloses Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets, Coin Telegraph, Mar. 11, 2019.
2. Ken Munro — BITFI You Wouldnt Steal My Cloins — DEF CON 27 IoT Village, DEFCON.
3. Sean Keane, John McAfee's 'unhackable' crypto-wallet allegedly hacked in a week, CNET, Aug. 3, 2018.
4. ANDREY SHEVCHENKO, Trezor Wallets Can Be Hacked, Kraken Reveals, Coin Telegraph, Jan. 31, 2020.
5. Baumhof, Breaking RSA Encryption — an Update on the State-of-the-Art, Quintessence Labs, 2019.
6. Jordana Cepelewicz, ‘Post-Quantum’ Cryptography Scheme Is Cracked on a Laptop, Quanta Magazine, Aug 24, 2022.
7. Zeynep Geylan, Lebanese people turn to crypto, decentralization as banks close down indefinitely, Cryptoslate, Sep. 22, 2022.
8. Thomas, The Advent and Fallout of EPR, Institute for Advanced Study, 2013.
9. Russia's Putin: It's too early to talk about using cryptocurrencies for oil contracts, Reuters, Oct. 14, 2021.
