Blockchain and Distributed Ledger Technologies

  1. Core Cryptographic Principles
    1. Introduction to Cryptography
      1. Historical Overview
        1. Symmetric vs Asymmetric Cryptography
          1. Role in Distributed Ledgers
            1. Security Assumptions
            2. Cryptographic Hash Functions
              1. Definition and Use Cases
                1. Properties of Hashing
                  1. Deterministic Output
                    1. Pre-image Resistance
                      1. Second Pre-image Resistance
                        1. Collision Resistance
                          1. Avalanche Effect
                          2. Common Hash Algorithms
                            1. SHA-256
                              1. SHA-3
                                1. BLAKE2
                                  1. Keccak
                                  2. Hash Functions in Blockchain
                                    1. Block Identification
                                      1. Merkle Tree Construction
                                        1. Proof of Work
                                      2. Public Key Cryptography
                                        1. Mathematical Foundations
                                          1. Key Generation
                                            1. Public and Private Keys
                                              1. Encryption and Decryption Processes
                                                1. Key Exchange Protocols
                                                  1. Elliptic Curve Cryptography
                                                  2. Digital Signatures
                                                    1. Purpose and Applications
                                                      1. Creating a Signature
                                                        1. Verifying a Signature
                                                          1. Non-repudiation
                                                            1. Signature Algorithms
                                                              1. ECDSA
                                                                1. RSA
                                                                  1. EdDSA
                                                                  2. Multi-signature Schemes
                                                                  3. Advanced Cryptographic Concepts
                                                                    1. Zero-Knowledge Proofs
                                                                      1. Commitment Schemes
                                                                        1. Threshold Cryptography
                                                                          1. Homomorphic Encryption