Lectures
Lecture 1: Introduction and Course Overview
Lecture 2: Introduction to Bitcoin
Lecture 3: PoW Longest Chain Protocol: Attacks and Security Analysis
Lecture 4: Bitcoin Transactions and Bitcoin Script
Lecture 5: Bitcoin Safety and Liveness
Lecture 6: Selfish Mining, Latency and Throughput
Lecture 7: Security Tradeoffs and from PoW to PoS
Lecture 8: Road to Tendermint
Lecture 9: Tendermint and Finality
Lecture 10: Proof-of-Stake Industry, Accountability, and Economic Security
Lecture 11: Tendermint Recap and Economic Security for PoS Consensus
Lecture 12: PoS Long Range Attacks and Light Clients
Lecture 13: Light Clients and Merkle Trees
Lecture 14: Validity and Fraud Proofs, and Rollups
Lecture 15: Scaling Bitcoin
Lecture 17: Linear Horizontal Scaling via Data Availability - Part I
Lecture 18: Linear Horizontal Scaling via Data Availability - Part II
|