SHA-256
SHA-256
Cryptography
17 references
دالة تجزئة مشفرة مستخدمة على نطاق واسع وتقوم بإخراج ملخصات 256 بت. تستخدم Bitcoin SHA-256 في إثبات العمل وفي خطوات التجزئة المختلفة.
يظهر في 17 أقسام من المستندات
$BTC
Bitcoin
$ETH
Ethereum
Mining
...s the requirement for "proof of work." The precise condition is that the double-SHA256 hash of every block, treated as a 256-bit number, must be less than a dynamical...
Miscellanea And Concerns
...on has a fixed gas cost. For example, a multiplication operation costs 5 gas, a SHA256 hash costs 20 gas, and every transaction has a base cost of 21,000 gas. Users s...
$XRP
XRP
$SOL
Solana
Introduction
...able record of time passage. PoH is implemented as a sequential computation — a SHA-256 hash chain where each output is used as the input for the next hash. Because SH...
Outline
...oof of History mechanism in detail, explaining its construction from sequential SHA-256 hashing and the properties that make it suitable as a verifiable delay function...
Proof of History
...o events. It uses a sequential pre-image resistant hash function — specifically SHA-256 — that is run continuously, with the previous output used as the next input. Pe...
Proof of History Sequence
...an arbitrary seed value and proceeds indefinitely, with the generator computing SHA-256 hashes as fast as the underlying hardware allows. Alongside the hash values, th...
Timestamp
...h rate of the generator). On a 4GHz processor computing approximately 4 million SHA-256 hashes per second, the PoH clock has a resolution of approximately 0.25 microse...
Performance
...e PoH generator runs on a dedicated CPU core, producing approximately 4 million SHA-256 hashes per second on a 4 GHz processor. This provides a clock resolution of 0.2...
Conclusion
...sm for creating a verifiable, trustless record of time passage using sequential SHA-256 hashing. By establishing a cryptographic clock before consensus, PoH removes th...
$DOGE
Dogecoin
Background
...ng a trusted central authority. Bitcoin's proof-of-work mechanism, based on the SHA-256 hashing algorithm, provided a Sybil-resistant method for validating transaction...
Technical Specifications
...nd memory access, distinguishing it from Bitcoin's purely computation-intensive SHA-256 algorithm.
The block generation target for Dogecoin is one minute, making it s...
$BCH
Bitcoin Cash
The Fork
...th the challenge of difficulty adjustment. Bitcoin Cash initially used the same SHA-256 difficulty from the Bitcoin chain, but with significantly less hash power devot...
Technical Specifications
...in Cash shares the fundamental technical architecture of Bitcoin, including the SHA-256 proof-of-work consensus mechanism, the UTXO transaction model, the secp256k1 el...
Network Architecture
...team has unilateral control over the protocol.
Mining on Bitcoin Cash uses the SHA-256 proof-of-work algorithm, identical to Bitcoin. This means that the same ASIC mi...
Monetary Policy
...itcoin and Bitcoin Cash means that the two chains are in direct competition for SHA-256 mining hash power. Miners allocate their resources to whichever chain is more p...