LecturesLecture 1: Introduction and Course OverviewLecture 2: Introduction to Bitcoin
Lecture 3: PoW Longest Chain Protocol: Attacks and Security Analysis
Lecture 4: Bitcoin Transactions and Bitcoin Script
Lecture 5: Bitcoin Safety and LivenessLecture 6: Selfish Mining, Latency and ThroughputLecture 7: Security Tradeoffs and from PoW to PoSLecture 8: Road to TendermintLecture 9: Tendermint and FinalityLecture 10: Proof-of-Stake Industry, Accountability, and Economic SecurityLecture 11: Tendermint Recap and Economic Security for PoS ConsensusLecture 12: PoS Long Range Attacks and Light ClientsLecture 13: Light Clients and Merkle TreesLecture 14: Validity and Fraud Proofs, and RollupsLecture 15: Scaling BitcoinLecture 17: Linear Horizontal Scaling via Data Availability - Part ILecture 18: Linear Horizontal Scaling via Data Availability - Part II |