SHA-256 is a cryptographic hash function with the SHA-2 family of hash functions. It was developed by the NSA (National Security Agency) in 2016 following the breakdown of its predecessor SHA-1. SHA-256 has never been compromised and is co…
Continue Reading
Showing posts from August 8, 2023
What is Merkle Tree
1:31 PM
0
A Merkle tree (or binary hash tree) involves taking large amount of data and making it more manageable to process. In the case of blockchain technology, merkle trees are used to organize transactions such as “Alice sent Bob 5 BTC”, using fe…
TDhendup
How mining works
12:27 PM
0
I have collected the best of the videos from youtube (Source: TechiSource ). The following two videos will show you how the mining works. The video will also demonstrate the use of nonce. Part 1: Part 2:
TDhendup
What is nonce
8:13 AM
0
Summary · A nonce stands for “number used once” in cryptographic communications. · It is randomly generated and cannot be calculated, only guessed. · The purpose of the nonce is to make it prohibitively difficult for…
TDhendup