Questions on: hash - страница 4

I need to generate a receive address that is directly associated with some metadata, M, that forms part of a verifiable contract. I require that customers can verify that an address really was generated from a specific contract message, but I do not
As Meni mentions, there are ways to change the hashing algorithm used for Bitcoin. For this change to be made, all clients would have to be updated and the blockchain would look very weird as it would still contain all historic data that used SHA256.
In this post I am going to cover my experience with Bitcoin mining over the past 20 months or so. During this time I have purchased specific hardware for the task of mining Bitcoins in order to come out with a profit at the end. My journey started in
If I want to prove that I wrote a particular document before a certain point in time, it would be sufficient to generate the sha256 hash of the document and somehow arrange for that hash to appear in the blockchain. Is there an easy way to do that si
Miner got dramatic hashrate improvement for CPU! GUI Miner updates: Hashrate is greatly improved (up to 3x) for non-AES-NI capable CPU Hashrate is very important to mining. If you are not sure what it is, here is an explanation from bitcoin. org
To formulate this question precisely, I will define an idealized hypothetical "perfect" hash function H(n) which has nice scalability properties, and will formulate a problem PERFECT HASHCASH in terms of that, understanding that practical considerati
Before we start, if you’re new to Bitcoin mining and don’t know what it is watch this short and simple explanation: “Is Bitcoin Mining Profitable in 2016?“ The short answer would be “It depends on how much you’re willing to spend”. Each person asking
I use armoryd (0. 93. 1) to send transactions in the testnet Bitcoin network with the three calls: 1
Bitcoin uses double hashing almost everywhere it hashes in one of two variants: It seems like Satoshi chose Hash256 whenever collisions are a problem, and Hash160 when only (multi target) second pre-images matter. This is consistent with a goal of ac