自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

FeelTouch Labs

Best or Nothing!

  • 博客(44)
  • 资源 (35)
  • 收藏
  • 关注

转载 C++之private虚函数--面试系列

一般我们说虚函数,它的访问级别都是public的,用类对象可以直接调用,这样就可以实现运行时的类型绑定,那如果我们将虚函数私有化会出现什么情况呢?我们先来看一个非虚函数私有化的例子class Base{private: void PrintClassName () { cout"Base"endl; }public:

2013-08-28 22:45:09 1007

原创 C++指针数组和数组指针--笔试面试系列

一、int main(int argc, _TCHAR* argv[]){       int a[5]={1,2,3,4,5};     int *ptr=(int *)(&a+1);    int *ptr1=a;    printf("%d,%d",*(a+1),*(ptr-1));     return 0;}结果:2,5解析:a[5]={1

2013-08-28 22:08:11 1290

原创 虚继承相关问题--笔试面试系列

1,虚继承是多重继承的特有概念,为解决多继承而出现的。如果B继承自A,C继承自A,且D同时继承自B和C,就会在类D中同时出现两次A。为了节省内存空间,可以将B、C对A的继承定义为虚继承。而A就成了虚拟基类。代码如下:class A;class B: public virtual A;class C: public virtual A;class D: public vi

2013-08-28 20:38:56 1149

原创 路由/协议系列--持续更新

1,路由环路的产生及解决?答案:http://net.chinaunix.net/1/2008/03/05/1148820.shtml

2013-08-16 23:30:25 982

原创 C++基础知识系列--持续更新

1,什么函数不能声明为虚函数 ?答案:1,http://blog.csdn.net/y296144646q/article/details/6409966 2,http://roz1987.blog.163.com/blog/static/1163929582010112615629823/

2013-08-16 12:14:51 872

原创 《启示录》读书笔记系列--终结篇

产品经理的反身清单,应时刻反省自己                                                                                                     1,产品能吸引消费者关注吗?2,产品设计是否人性化,是否易于操作?3,产品能在竞争中取胜吗?即使未来风云变化,依旧能取胜吗?4,产品是否有别于市

2013-08-10 23:07:59 1465

原创 《启示录》读书笔记系列--笔记二十

打造富有创意产品的十大要点:                                                                                                                                                                     1,产品管理职责:清楚产品经理的职

2013-08-10 22:55:54 1352

原创 《启示录》读书笔记系列--笔记十九

合格产品应该具备哪些特征?                                                                                                             1,产品具有价值,用户愿意掏钱购买产品。也可能是掏钱为了移除广告,或者售后服务。2,产品能在多种环境下运行,不是定制软件。3,只要提供必要的

2013-08-10 22:41:21 1244

原创 《启示录》读书笔记系列--笔记十八

视觉设计和交互设计,正如产品管理与产品营销一样,两者缺一不可,共同配合产品经理定义好的产品。 管理大众网络服务产品的十大要点:                                                                                                                   1,可用性产品必须有良好

2013-08-10 22:31:56 1347

原创 《启示录》读书笔记系列--笔记十七

苹果公司给我们的启示:                                                                                                                                 1,硬件和软件服务:明白硬件必须为软件服务,不能颠倒。采用多点显示屏、重力加速器、距离传感器思维了配合软件满足用

2013-08-10 22:11:00 1687

原创 《启示录》读书笔记系列--笔记十六

合理运用敏捷方法的十大秘诀:适用于产品软件,而不是定制软件                                        有如下敏捷方法包括SCRUM和极限编程1,产品经理及产品负责人,代表了客户需求,因而需要与产品开发团队不饿哦吃密切的联系,督促开发过程,及时解决问题。2,使用敏捷方法绝不等于省略产品规划。产品经理仍然要明白产品产品方向和目标,设定含量产品成功与否

2013-08-10 08:52:13 1427

原创 《启示录》读书笔记系列--笔记十五

改进现有产品                                                                                                                                           改进现有产品不是简单地满足单个用户的需求,也不能对用户调查照单全收,提高指标的功能才是应该关注的。应找

2013-08-09 17:43:44 1349

原创 《启示录》读书笔记系列--笔记十四

原型测试                                                                                                                                                  用高保真模型代替产品说明文档最主要的原因是产品原型可以让用户验证产品的创意,加深产品经理对产

2013-08-09 17:21:39 1384

原创 利用应用初始化数组

2013-08-09 09:32:32 949

原创 《启示录》读书笔记系列--笔记十三

需求调研应与用户体验设计同步进行,因为两者相互影响,而不应是瀑布模型开发与测试也应该同步进行但是.......用户体验不能与软件开发放在一起,原因如下:1,一旦产品进入开发,修改思路非常困难,越往后成本越高。因为开发团队根据用户需求和产品定义设计软件架构,后期开发一直围绕架构进行,返工容易打消积极性。2,用户体验设计同时保证可用性和价值,任务重,应该反复验证。等到迭代周期后,在

2013-08-08 21:48:41 1366

原创 《启示录》读书笔记系列--笔记十二

产品人物角色                                                                                                                                         人物角色又称为用户特征记录(user profile),,是指通过与用户沟通交流,确定典型的目标用户的类型

2013-08-08 19:16:57 1449

原创 《启示录》读书笔记系列--笔记十一

市场调研                                                                                                                               市场调研的作用存在争议:市场部门与产品部门在市场调研工具和市场调研方法在探索产品中的作用,产生原因:双方不清楚市场调研的作

2013-08-08 17:12:34 1586

原创 行业关注网站收藏--持续更新

一,产品,运营,交互设计类网址一:http://www.visionunion.com/interface_topic.jsp?$REQUERY$=1&query_subtopic=ee网址二:http://developer.yahoo.com/ypatterns/social/people/reputation/index.html网址三:http://dribbble.com/

2013-08-08 00:54:24 1359

原创 《启示录》读书笔记系列--笔记十

特约用户方法:项目开始阶段,物色至少6位积极、活跃、乐于分享的目标用户,要求他们在产品的目标用户中有一定影响力。至于他们是否使用过原有的产品并不重要。好处:1,参与构思产品创意,解决他们手头问题--他们最清楚产品要解决的问题。2,提前试用产品,越早使用产品意味着越早解决麻烦。3,通常,提前使用产品还可以显著降低用户的各种成本。产品经理的收获:1,聚拢第一批用户,可以为定

2013-08-07 22:53:04 1267

原创 《启示录》读书笔记系列--笔记九

产品评审团                                                                                                                                            可以制定更及时、更可靠的产品决策工作目标:决定产品战略方向,宏观上监督产品研发流程,合理配置资源。

2013-08-07 22:27:11 1350

原创 《启示录》读书笔记系列--笔记八

产品探索

2013-08-07 21:47:49 1175

原创 《启示录》读书笔记系列--笔记七

评估产品机会评估产品机会是产品经理的重要职责。目的在于:淘汰馊主意,避免浪费时间和金钱;挑选合适产品就会,团结团队,理解产品,整合资源。为了评估产品机会,产品经理应回答如下十个问题。1,产品要解决什么问题?即,产品价值2,为谁解决问题?即,目标市场3,成功机会多大?即,市场规模4,怎样判断产品是否成功?即,度量指标或收益指标5,有哪些同类产品?即,竞争产品6,为什么

2013-08-07 21:00:00 1129

转载 网络管理员面试时常用的问题及答案

转自:http://bbs.51cto.com/thread-714900-1.html1.请写出568A与568B的线序 2.按照数据访问速度排序:硬盘、CPU、光驱、内存 3.请写出下列服务使用的默认端口POP3、SMTP、FTP 4.网卡MAC是由6组什么组成的 5.ISO/OSI 7层模型是什么 6.C/S、B/S的含义 7.RFC950定义了什么? 8.综

2013-08-07 11:50:34 7202

原创 拷贝构造函数与Const常量引用

class MyInt{ public: MyInt() {//构造函数 std::cout << "1" << std::endl; } MyInt(int a) {//初始化对象时,同时实现赋一个int值 std::cout << "2" << std::endl; } vo

2013-08-06 23:00:42 2342

原创 getchar()函数的详细理解以及回车和换行的区别

先看如下代码:int main(int argc, _TCHAR* argv[]){ int ch; printf("Input characters:"); while((ch=getch())!=13) printf("*"); return 0;}getchar()返回的是int型值,也就是对应的ASCII码,所以赋值时ch也

2013-08-06 21:28:21 5240

原创 《启示录》读书笔记系列--笔记六

产品总监主要职责,第一,组建优秀的产品经理团队。第二,规划公司的全局产品战略,对产品组合负责。建设产品管理团队:设计一套培训计划,让新入职的产品经理充分接触用户和技术。如果某位产品经理无法胜任,必须立即解雇,寻找新人。规划公司的产品战略:产品总监负责公司的系列产品,决定公司经营什么产品,仔细评审美观产品的战略和开发流程。产品总监应该处理好与公司同事的关系,特别是得到公司高管的信任。

2013-08-06 21:05:47 1361

原创 《启示录》读书笔记系列--笔记五

产品经理应用的素质和态度1、对产品热情对产品本能热爱,把生活中一切事物堪称产品,对优秀产品热爱和尊重。判断方法:让应聘者谈谈自己最喜欢的产品及原因,聊聊不同领域的产品和他讨厌的产品,问问对方,如果有机会,打算怎样完善自己的产品。2、用户立场不要从自己的角度出发,而应该从用户的角度出发。可以让他们谈谈换位思考,了解应聘者对市场的感觉,看是否希望融入到市场当中。3,智力

2013-08-06 19:49:52 1162

转载 内存泄漏以及常见的解决方法

转自:http://blog.csdn.net/na_he/article/details/7429171之所以撰写这篇文章是因为前段时间花费了很大的精力在已经成熟的代码上再去处理memory leak问题。写此的目的是希望我们应该养成良好的编码习惯,尽可能的避免这样的问题,因为当你对着一大片的代码再去处理此类的问题,此时无疑增加了解决的成本和难度。准确的说属于补救措施了。1. 什么是内存

2013-08-06 12:22:28 944

原创 临时对象以及const引用详解

先从一个问题讲起:设有class Avoid DoSomething(A &a){......}int main(){DoSomething(A());}为什么不能这样?A a;DoSomething(a);为什么这样就行?引用类型的对象的生存期必须在其绑定的对象的生存期之内改成如下可以:void DoSomething(A

2013-08-06 12:17:07 3305

原创 《启示录》读书笔记系列--笔记四

产品管理与项目管理零售软件适于一人兼任两职,但是互联网产品不行,及服务类软件。互联网产品的对网站代码局部修改频繁,发布周期缩短,二大部分项目的开发周期明显长于发布周期,为了适应这种变化出现了并行开发和火车模型的发布模式。火车模型发布模式需要强有力的、有效的项目管理。而很多工作不能很好的做到。所以随着发布的频繁,必须必须指派项目经理来控制产品发布,也就是项目管理慢慢从产品管理职能中分离出

2013-08-05 22:05:14 1119

原创 《启示录》读书笔记系列--笔记三

产品管理与产品营销:两者不是一回事产品失败的原因分析:1,最根本--对产品经理的职责界定不清。产品经理从细节上定义开发什么产品,市场营销对外宣传产品。1)有市场营销人员定义产品问题是忽落了收集详细产品需求的步骤、回避了定义产品的过程。2)两人分担定义产品原因是产品营销人员负责收集高层业务需求,产品经理负责收集低层产品需求。导致两个人都不是真正的产品负责人,没有人对最终的产品

2013-08-05 21:43:03 1154

原创 进程之间的通信方式及其详解

一、无名管道(pipe)也成匿名管道,是一种半双工的通信方式,数据只能单向流动,而且只能在具有亲缘关系的进程间使用。进程的亲缘关系通常是指父子进程关系。具有如下特点:1、半双工。即数据只能在一个方向上流动。2,只能在具有公共祖先的进程间使用。通常一个管道由一个进程创建,然后该进程调用fork,然后父子进程间就可以应用该管道。3,数据从管道的一端写入,从另一端读出。一个进程向管道

2013-08-05 20:23:45 2110

原创 内存管理和页抖动(pagethrashing)

有些操作系统(如UNIX和增强模式下的Windows)使用虚拟内存,这是一种使机器的作业地址空间大于实际内存的技术,它是通过用磁盘空间模拟RAM(random—access memory)来实现的。 在80386和更高级的Intel CPU芯片中,和现有的大多数其它微处理器(如Motorola 68030,sparc和Power PC)中,都有一个被称为内存管理单元(Memory Man

2013-08-05 18:37:06 5320

原创 No symbol "*" in current context的解决办法总结

注:标题中的“*”代指你想打印的任意变量看完别人的解决方法之后,我自己的总结方法时,编译选项加上“-g”

2013-08-05 09:55:44 11281

原创 《启示录》读书笔记系列--笔记二

产品经理主要职责:评估产品机会和定义要开发的产品产品创意来源:公司高管意见、用户反馈、可用性测试结果、产品团队和营销团队的点子、业内人士分析等。产品经理就是负责评估这创意和需求时候采纳:可采用市场需求文档(MRD)或机会评估(OA)。确定产品机会后就需要探索产品解决方案,包括基本的产品特征和功能、用户体验、产品的发布标准。这是核心职责。此过程中可借助产品需求文档(PRD),应该清晰

2013-08-04 22:18:28 1172

原创 《启示录》读书笔记系列--笔记一

如果开发出的产品没有市场价值,无论再优秀的开发团队也没用,所以仅仅做产品是不够的,还要开发出有价值、可用的、可行的产品。可以将产品的开发开发分为人员、流程和产品三块。人员是指负责定义和开发产品的团队成员。流程是指探索、开发富有创意的产品时,反复应用的步骤和成功的实践经验。产品是指富有鲜明特性的产品。好产品的具有如下规律:1,产品经理任务是探索产品的介值、可用性和可行性。

2013-08-04 21:53:50 1410

原创 编译原理与文法

乔姆斯基把方法分成四种类型,即0型、1型、2型和3型。这几种文法类型的概念一定要掌握,是一个非常重要的考点。对于这几种文法,一般书上都只有简单的概念介绍,比较抽象,所以很多学员都没有真正理解。下面我将把概念结合例题进行讲解。  0型文法  设G=(VN,VT,P,S),如果它的每个产生式α→β是这样一种结构:α∈(VN∪VT)*且至少含有一个非终结符,而 β∈(VN∪VT)*,则G是一个0

2013-08-04 21:31:36 1150

原创 STL模板中deque的深度应用(双端队列)

实例详解一:http://www.2cto.com/kf/201204/126761.html

2013-08-04 17:05:52 1240

原创 C++实现文件写入和读取

简要例子:#include using namespace std;void f( ){ ofstream out("abc.txt"); out << 3 << '\t' << "abc" << endl; out.close( );}实际上就是把输出到屏幕上的cout,输出到了文件中fout。#include #include #inc

2013-08-04 12:01:53 13838

原创 字符串转换成double和float总结

一、atof()和strtod(char * ,char **)函数转换成double类型头文件是stdlib.h 用double atof(char *)可以用double strtod(char * ,char **)也可以,用这个函数时,一般第二个参数设置为NULL #include #include using namespace std;void main()

2013-08-04 11:48:21 12524

GO 中 Chan 实现原理分享

本文聚焦: 1.chan是什么 2.chan的底层数据结构 3.chan的读写基本流程 4.与sync的区别

2024-01-29

storj dcs video use case

Video Storage & Streaming

2023-12-25

Aurora - 去中心化的以太坊 Layer2

Aurora is a L2 Network

2023-12-25

闪电贷的攻防和智能合约审计

闪电贷和闪电兑,以及智能合约的安全防范

2023-12-25

Poly Network 技术架构

To build the next generation internet

2023-12-24

VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK DRAFT

Present-day blockchain architectures all suffer from a number of issues not least practical means of extensibility and scalability. We believe this stems from tying two very important parts of the consensus architecture, namely canonicality and validity, too closely together. This paper introduces an architecture, the heterogeneous multi-chain, which fundamentally sets the two apart.

2023-12-24

Security audit report for imtoken wallet

This security audit is a requested service authorized by the client. The service is mainly about application penetration testing which helps to find the vulnerabilities and threats of the target. All the penetration testing items are done by simulating the real world malicious attacks against the target, which mimics human hackers’ activities by manual penetration testing with automated tools.

2023-12-24

Decentraland is a blockchain-based virtual world

Decentraland is a virtual reality platform powered by the Ethereum blockchain. Users can create, experience, and monetize content and applications. Land in Decentraland is permanently owned by the community, giving them full control over their creations. Users claim ownership of virtual land on a blockchain-based ledger of parcels. Landowners control what content is published to their portion of land, which is identified by a set of cartesian coordinates (x,y). Contents can range from static 3D

2023-12-24

The Bitcoin Standard

The Bitcoin Standard Bitcoin的表演

2023-12-24

力场的定位是一个以公链共建挖矿为核心的社区平台以及UGC平台

力场的定位是一个以公链共建挖矿为核心的社区平台以及 UGC(用户生成贡 献)平台。力场的愿景是成为公链生态第一社区,无力场,不公链。 力场的使命是赋能公链生态,以(贡献)行为挖矿为切入点,形成公链、KOL、 用户、Dapp 共生、共建、共利的区块链用户社区。

2023-12-24

A Novel Metastable Consensus Protocol Family for Cryptocurrencie

This paper introduces a new family of leaderless Byzantine fault tolerance protocols, built on a metastable mechanism. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries, while their concurrent nature enables them to achieve high throughput and scalability.

2023-12-24

Measuring Ethereum Network Peers

Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum—and blockchain systems in general—have been widely-studied, most analysis has focused on application level features of these systems such as cryptographic mining challenges, smart contract semantics, or block mining operators.

2023-12-24

Firework Games White Paper

Firework Games will be the most advanced and forward-looking blockchain game platform. Our vision is to provide an open and inclusive diverse game world based on the pure blockchain technology, which will change the game industry in modern society. Everyone is freely allowed to create, to play and to enjoy his own role in the parallel world.

2023-12-24

CS251 Final Exam 2021

You may use any (non-human) resource to answer the questions. You may not collaborate with others.

2023-12-24

Generic Construction of Ring Signatures with Efficient

We introduce a novel generic ring signature construction, called DualRing, which can be built from several canonical identification schemes (such as Schnorr identification).DualRing differs from the classical ring signatures by its formation of two rings: a ring of commitments and a ring of challenges. It has a structural difference from the common ring signature approaches based on accumulators or zero-knowledge proofs of the signer index.

2023-12-24

The Gridex Protocol

The Gridex Protocol is a permissionless and non-custodial trading protocol consisting of a set of persistent, non-upgradable smart contracts on the Ethereum blockchain. Unlike the current mainstream decentralized exchanges based on the Automated Market Maker (AMM) model, Gridex is based on order books. With our novel Grid Maker Order Book (GMOB) model, we have significantly reduced the resource consumption of running an order book based system, allowing us to deploy and run it on the Ethereum.

2023-12-24

Efficient Zero-Knowledge Arguments for Arithmetic Circuits

We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarithmic and for an arithmetic circuit with fan-in 2 gates the computation of the prover and verifier is linear in the size of the circuit. The soundness of our argument relies solely on the well-established discrete logarithm assumption in prime order groups.

2023-12-24

KishuInu Whitepaper

$KISHU is an ERC20 token which started on the Ethereum blockchain April 17, 2021. The max supply is 100 quadrillion and one of its key functionalities is its decentralized usage rewards mechanism. For every active user transaction a 2% $KISHU reward is granted to holders’ decentralized wallets only, fostering a healthy distrubuted network and community usage. The more $KISHU is actively used, the more rewards are granted!

2023-12-24

On the Instability of Bitcoin Without the Block Reward

Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.

2023-12-24

Shorter Proofs for Privacy-Enhanced Distributed Ledger

We present a new short zero-knowledge argument for the range proof and the arithmetic circuits without a trusted setup. In particular, the proof size of our protocol is the shortest of the category of proof systems with a trustless setup. More concretely, when proving a committed value is a positive integer less than 64 bits, except for negligible error in the 128-bit security parameter, the proof size is 576 byte long, which is of 85.7% size of the previous shortest one due to Bunzetal.

2023-12-24

Attacking Threshold Wallets

Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions. These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature. This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based.

2023-12-23

This paper provides an architectural overview of the Avalanche

Avalanche is a high-performance, scalable, customizable, and secure blockchain platform. It targets three broad use cases: 15 – Building application-specific blockchains, spanning permissioned (private) and permissionless (public) deployments. – Building and launching highly scalable and decentralized applications (Dapps). – Building arbitrarily complex digital assets with custom rules, covenants, and riders (smart assets).

2023-12-23

Avalanche Native Token ($AVAX) Dynamics

This paper discusses the key implementation details, in particular the token economics (tokenomics), of the native token of the Avalanche platform, called 5 $AVAX. The native token secures the network, pays for fees, and provides the basic unit of account between the multiple blockchains deployed on the larger Avalanche network. For additional details on Avalanche, which serves as a versatile and universal platform, allowing anyone to launch new blockchains with their own rules, virtual machine

2023-12-23

ZKSwap是一个基于 ZK-Rollup 的 Layer2 代币Swap协议

是一种基于 ZK-Rollup 技术的 Layer-2 AMM 去中心化交易协议 ZKSwap,在 Layer-2 上实现了 uniswap 的所有功能,在保证去中心化交易的核心 价值的同时,实现实时交易,把 Uniswap 的 TPS(每秒可以处理的交易数量) 提升了多个数量级,同时交易的过程几乎不需要消耗任何 Gas 费用。 ZKSwap 系统由链上智能合约,链下 ZKSwap Server,零知识证明系统和前端 用户界面组成。

2023-12-23

ZEND White Paper

You agree that you are acquiring ZEND to participate in zkLend and to obtain services on the ecosystem thereon. The Company, the Distributor and their respective affiliates would develop and contribute to the underlying source code for zkLend. The Company is acting solely as an arms’ length third party in relation to the ZEND distribution, and not in the capacity as a financial advisor or fiduciary of any person with regard to the distribution of ZEND.

2023-12-23

KZen Curv Security Audit

KZen Curv is a library written in Rust providing low-level elliptic curve cryptography functionalities (ECC), as well as higher-level protocols such as key-exchange, secret sharing, zero-knowledge, and multi-party computation. KZen Curv 是一个用 Rust 编写的库,提供低级椭圆曲线加密 功能 (ECC) 以及更高级别的协议,例如密钥交换、秘密 共享、零知识、多方计算。

2023-12-23

为什么虚拟资产值得投资:元宇宙虚拟地产报告

本篇报告回顾了2021年Metaverse虚拟地产商生态的发展,并讨论了与之相关的主要市场趋势。这些趋势包括:主流传统玩家的入场;Metaverse技术的商业应用(包括游戏和应用);以及非同质化代币NFT对于整个整体元宇宙的影响。

2023-10-27

元宇宙:未来数字绿洲入口已打开

元宇宙是与现实世界高度互通的虚拟世界,具有同步和拟真、开源和创 造、永续、闭环经济系统四大核心属性。元宇宙的兴起将伴随着 AR/VR、 云计算、AI、5G 等技术的进化,人类对虚拟世界的构建和发展将造就互 联网的终极形态——METAVERSE。随着 ROBLOX 上市受到追捧,元宇宙 正从概念走向现实,国内对标公司或如雨后春笋般出现,产业链发展值 得重视。

2023-10-27

Code Assessment of Liquidations 2.0 Smart Contracts

First and foremost we would like to thank the Maker Foundation for giving us the opportunity to assess the current state of their Liquidations 2.0 system. This document outlines the findings, limitations, and methodology of our assessment. Initially, our code assessment resulted in a number of findings regarding security and correctness. After the submission of the intermediate reports all findings have been resolved. These have been marked accordingly and can be found in the Resolved Findings s

2023-10-27

Scalable and Probabilistic Leaderless BFT Consensus through Meta

This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, they are quiesce

2023-10-27

Groth16: a pairing-based (preprocessing) SNARK for arithmetic

Non-interactive arguments enable a prover to convince a verifier that a statement is true. Recently there has been a lot of progress both in theory and practice on constructing highly efficient non-interactive arguments with small size and low verifi- cation complexity, so-called succinct non-interactive arguments (SNARGs) and succinct non-interactive arguments of knowledge (SNARKs). Many constructions of SNARGs rely on pairing-based

2023-10-27

The offer-is-code approach to Decentralised Exchanges

This paper introduces a novel and quite general approach to trading which we term “offer-is-code”. We demonstrate the idea by building around it the Mangrove protocol, a decentralised spot market. Mangrove offers are sorted in an order book. Each offer contains a callback address which the matching engine calls when the offer is effectively matched. Incentives are set to make sure that offers are not empty promises.

2023-10-27

A Classification Framework for Stablecoin Designs

In this paper, we systematically discuss general design, decompose existing stablecoins into various component design elements, explore their strengths and drawbacks, and identify future directions. Stablecoins promise to bridge fiat currencies with the world of cryptocurrencies. They provide a way for users to take advantage of the benefits of digital currencies, such as ability to transfer assets over the internet, provide assurance on minting schedules and scarcity。

2023-10-27

EIP-1559 proposal

EIP-1559 is a proposal to make several tightly coupled additions to Ethereum’s transaction fee mechanism, including variable-size blocks and a burned base fee that rises and falls with demand. This report assesses the game-theoretic strengths and weaknesses of the proposal and explores some alternative designs.

2023-10-27

Unipass 区块链实现发送红包的技术分析

1.底层技术支撑 2.Subtle Crypto 和 WebAuthn 3.DKIM

2023-10-24

区块链黑暗森林全面自救手册

囊括了区块链安全指导的方方面面,从创建钱包、备份钱包、使用钱包、传统隐私保护、人性安全、作恶方式、被盗止损等方面进行了全面讲解。

2023-10-24

Sui将地址从160为切换到256的合理性分析

从安全的角度全面分析了Sui的地址从160bits切换到256bits为什么更安全

2023-10-24

拥抱十字路口的挑战:中国金融科技新篇章

科技企业和传统金融机构如何在 新的生态中找到 各自的定位,确 保自己的生存和 发展,引发了强 大张力。与此相 关联,监管部门 的任务变得更加 富有挑战性:一 方面鼓励创新的 战略基调不变, 另一方面更加谨 慎地防范创新中 可能出现的风险,特别是系统 性金融风险和涉 众型社会风险; 同时还需要平衡 科技公司和传统 金融机构的利益。 原有金融体系 最重要的资源是 资金,以资本为 中心。新金融体 系最重要的资产 是数据,以数据 为中心。信用、 支付、风控和技 术等要素都必须 依靠数据运转。 有必要结合创 新带来的变化构 建新的监管框架 与体系,进一步 推进从机构监管 向功能监管的转 型,完善监管覆 盖范围。将所有 金融业务都纳入 监管,同类业务 同一监管,增强 监管的统一性。 同时也可通过 “监管沙盒”试 点等方式增加监 管与创新机构的 互动,保持监管 对新技术的敏感 度。

2023-02-25

Succinct Arguments、Randomized Algorithms、Universal zk-SNARKs

In this paper, we first present a new zk-SNARK system that is well-suited for randomized algorithms—in particular it does not encode randomness generation within the arith- metic circuit allowing for more practical prover times. Then, we design a universal circuit that takes as input any arith- metic circuit of a bounded number of operations as well as a possible value assignment, and performs randomized checks to verify consistency.

2023-02-25

Succinct Non-Interactive Zero Knowledge

Our circuit generator is the first to be universal: it does not need to know the program, but only a bound on its running time. Moreover, the size of the output circuit depends additively (rather than multiplicatively) on program size, allowing verification of larger programs. The cryptographic proof system improves proving and verification times, by leveraging new algorithms and a pairing library tailored to the protocol.

2023-02-25

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除