Uvicorn & Gunicorn
Uvicorn and GunicornUvicorn and Gunicorn are important concepts when developing applications in Python. However, there are many concepts to be aware of in order to fully understand Uvicorn and Gunicorn. The following is a brief summary of the necessary concepts, and the details will be dealt with separately later.Necessary ConceptsStarletteStarlette is a Web application server that can run asynchronously. Starlette runs on top of Uvicorn.FastAPIFastAPI provides many features on top of Starlet...
Gas optimization in Solidity, Ethereum
I’m sorry but my English is terrible. I hope you understand that generously.Recently, I was developing a toy project named Blind Market. It’s a simple P2P trading application using smart contract. I was making a contract using Solidity, and the trade stage proceeded in the order of pending, shipping, and done. The problem was appeared in done phase. The problem was that when I tried to close the transaction by paying the price raised by the seller in msg.value, the following error occurred.Pe...
P2WPKH
P2WPKHP2WPKH란 비트코인 내에서 가장 일반적인 스크립트 형식으로 비트코인 프로토콜에 대한 지불 거래 유형이다. 주소는 1로 시작하는데, 세그윗을 지원하는 새로운 주소 3 또는 bc1로 시작하는 주소보다 훨씬 비싸다. https://mirror.xyz/0xA1d9f681B25C14C1eE7B87f1CF102E73cA3ad4d9/egjhNVklgy_LgZmcTXXAOTBa6ePBqO3Ja9ZSoDIad-8 즉, 비트코인 주소가 1로 시작하면 P2PKH 주소를 사용하고 있는 것이다. 공개키의 간단한 해시이며, 이 해시를 주소로 사용하는 것이다. 이것은 원래 비트코인 주소 형식이었으며 오늘까지도 충실히 작동한다. 레거시 주소는 세그윗과 호환되지 않지만, 여전히 문제없이 P2PKH 주소에서 세그윗 주소로 BTC를 보낼 수 있다. 그러나 레거시 주소 트랜잭션이 더 크기 때문에 P2PKH 주소에서 전송하는 평균 속도는 세그윗 주소에서 전송할 때보다 더 높은 요금이 발생할 수 있다....
Uvicorn & Gunicorn
Uvicorn and GunicornUvicorn and Gunicorn are important concepts when developing applications in Python. However, there are many concepts to be aware of in order to fully understand Uvicorn and Gunicorn. The following is a brief summary of the necessary concepts, and the details will be dealt with separately later.Necessary ConceptsStarletteStarlette is a Web application server that can run asynchronously. Starlette runs on top of Uvicorn.FastAPIFastAPI provides many features on top of Starlet...
Gas optimization in Solidity, Ethereum
I’m sorry but my English is terrible. I hope you understand that generously.Recently, I was developing a toy project named Blind Market. It’s a simple P2P trading application using smart contract. I was making a contract using Solidity, and the trade stage proceeded in the order of pending, shipping, and done. The problem was appeared in done phase. The problem was that when I tried to close the transaction by paying the price raised by the seller in msg.value, the following error occurred.Pe...
P2WPKH
P2WPKHP2WPKH란 비트코인 내에서 가장 일반적인 스크립트 형식으로 비트코인 프로토콜에 대한 지불 거래 유형이다. 주소는 1로 시작하는데, 세그윗을 지원하는 새로운 주소 3 또는 bc1로 시작하는 주소보다 훨씬 비싸다. https://mirror.xyz/0xA1d9f681B25C14C1eE7B87f1CF102E73cA3ad4d9/egjhNVklgy_LgZmcTXXAOTBa6ePBqO3Ja9ZSoDIad-8 즉, 비트코인 주소가 1로 시작하면 P2PKH 주소를 사용하고 있는 것이다. 공개키의 간단한 해시이며, 이 해시를 주소로 사용하는 것이다. 이것은 원래 비트코인 주소 형식이었으며 오늘까지도 충실히 작동한다. 레거시 주소는 세그윗과 호환되지 않지만, 여전히 문제없이 P2PKH 주소에서 세그윗 주소로 BTC를 보낼 수 있다. 그러나 레거시 주소 트랜잭션이 더 크기 때문에 P2PKH 주소에서 전송하는 평균 속도는 세그윗 주소에서 전송할 때보다 더 높은 요금이 발생할 수 있다....
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers
https://www.udemy.com/course/best-blockchain-az/
The SHA256 hash is like a fingerprint. The SHA256 hash was developed by the National Security Agency (NSA).
It is used in many applications around the world, and it is also used in blockchain.
Let's understand the operating principles and concepts of SHA.
SHA256 stands for Safe Hash Algorithm, and 256 is the number of bits that occupy the memory.
The hash is always 64 characters long and can come with numbers or characters, but because it is a hexadecimal hash, it comes with 16 characters of [0-9] + [A-F].
64 characters take up 256 bits, so each character takes up 4 bits. It can be said that this algorithm is very good in that it can be applied to any digital document as well as Text document.
https://tools.superdatascience.com/blockchain/hash
The hashing algorithm has five requirements. Of course, there is not only SHA256 in the algorithm, but there are SHA512, SHA3, and so on.
We can also create hashing algorithms, but we need to meet some requirements to make them useful.
One-Way
Just like a human fingerprint, having a fingerprint cannot restore a person. Also, you can't tell a person's information (name or personality) by fingerprints.
Deterministic
Applying the same document to the hashing algorithm requires obtaining the same hash value.
Fast Computation
The Avalanche Effect
The avalanche effect means that the hash value is completely different if there is even a very small variation (a change of 1 bit) in the same document. The reason why it is called the avalanche effect is the way the algorithm is implemented, which I think would be better to look up the paper.
Must withstand collisions
The hash was likened to a fingerprint, and with a probability of one in 60 million, you may meet someone with the same fingerprint. The same goes for hash. The hashing algorithm uses 64 bits, which can produce many combinations, but is still not infinite. That's why having the same hash is theoretically unlikely, but it can happen. However, this is a rare occurrence, so it can be sufficiently solved. Collision resistance means that the algorithm must be able to withstand artificial collisions. If an attacker deliberately makes the hash of two different documents identical, the document can be forged. Whether such collision can be resisted can be said to be collision resistance.
https://www.udemy.com/course/best-blockchain-az/
The SHA256 hash is like a fingerprint. The SHA256 hash was developed by the National Security Agency (NSA).
It is used in many applications around the world, and it is also used in blockchain.
Let's understand the operating principles and concepts of SHA.
SHA256 stands for Safe Hash Algorithm, and 256 is the number of bits that occupy the memory.
The hash is always 64 characters long and can come with numbers or characters, but because it is a hexadecimal hash, it comes with 16 characters of [0-9] + [A-F].
64 characters take up 256 bits, so each character takes up 4 bits. It can be said that this algorithm is very good in that it can be applied to any digital document as well as Text document.
https://tools.superdatascience.com/blockchain/hash
The hashing algorithm has five requirements. Of course, there is not only SHA256 in the algorithm, but there are SHA512, SHA3, and so on.
We can also create hashing algorithms, but we need to meet some requirements to make them useful.
One-Way
Just like a human fingerprint, having a fingerprint cannot restore a person. Also, you can't tell a person's information (name or personality) by fingerprints.
Deterministic
Applying the same document to the hashing algorithm requires obtaining the same hash value.
Fast Computation
The Avalanche Effect
The avalanche effect means that the hash value is completely different if there is even a very small variation (a change of 1 bit) in the same document. The reason why it is called the avalanche effect is the way the algorithm is implemented, which I think would be better to look up the paper.
Must withstand collisions
The hash was likened to a fingerprint, and with a probability of one in 60 million, you may meet someone with the same fingerprint. The same goes for hash. The hashing algorithm uses 64 bits, which can produce many combinations, but is still not infinite. That's why having the same hash is theoretically unlikely, but it can happen. However, this is a rare occurrence, so it can be sufficiently solved. Collision resistance means that the algorithm must be able to withstand artificial collisions. If an attacker deliberately makes the hash of two different documents identical, the document can be forged. Whether such collision can be resisted can be said to be collision resistance.
No comments yet