1.11.3 SPECTRE and the Condorcet Paradox
1.11.4 Fermat’s Little Theorem
1.11.6 Fungibility and Liveness
1.11.7 Transaction and Settlement Finality
1.11.9 Winternitz One-Time Signatures
1.12.3 Blockchain or Distributed Ledger?
1.25 Ethash Algorithm and Dagger Hashimoto
1.26 Keccak256 / SHA3
1.27 Other Protocols Used in Blockchain Platforms
1.28 Nonce
1.29 Blockchain Forks
1.30 Sidechains
1.31 Blockchain Execution Engine
1.32 Serialization
1.33 The Blockchain Technology Stack
1.34 DAG—Directed Acyclic Graph
1.34.1 MerkleDAG
1.34.2 BlockDAG
1.35 Blockchain-Specific Attacks
1.35.1 Virtual Machines
1.35.2 Smart Contracts
1.35.3 Wallets
1.35.4 Other Attacks
2.1 How Does Bitcoin Work?
2.2 The Bitcoin Blockchain: The Network
2.3 Bitcoin Blocks
2.4 Bitcoin Transactions
2.5 Bitcoin Signing and Verification
2.6 UTXO
2.6.1 Timelocks
2.7 Bitcoin Serialization
2.8 Bitcoin Script
2.8.1 Ivy for Bitcoin
2.9 Bitcoin Miniscript
2.10 Bitcoin Addresses
2.10.1 Encrypted Private Keys (BIP-38)
2.11 Bitcoin Wallet
2.12 Simplified Payment Verification
2.12.1 SPV Wallet Client
2.13 Segregated Witness
2.14 Bitcoin Improvement Proposals
2.15 Schnorr Signatures
2.16 Taproot, G’root, and Graftroot
2.17 Bitcoin Mining
2.18 Bitcoin Relay Networks
2.19 Bitcoin: The Cryptocurrency
2.20 Payment Channels on Bitcoin
2.20.1 Nakamoto High-Frequency Transactions
2.20.2 Spillman-Style Payment Channels
2.20.3 CLTV-Style Payments
2.20.4 Poon-Dryja Payment Channels
2.20.5 Decker-Wattenhofer Duplex Payment Channels
2.20.6 Decker-Russell-Osuntokun Eltoo Channels
2.20.7 Hashed Time-Locked Contracts or HTLCs
2.20.8 Transaction Malleability
2.21 Wasabi Wallet and Zerolink
2.22 Meta-Coin Platforms on Top of Bitcoin: Colored Coins
2.23 OpenAssets Protocol