Additional Resources
An extensive collection of important resources, articles, papers, and explainers relevant to cryptocurrencies and blockchain.
Everyone is welcommed and encouraged to contribute!
Audience
This document is targeted at technical people, who are looking to gain a deep understand of the concepts behind cryptocurrencies, blockchain and decentralized technologies.
Topics
Books
Mastering Bitcoin available for free on Github or at Amazon by A. Antonopoulos
Mastering Ethereum (available for free on Github), or at Amazon by A. Antonopoulos and Gavin Wood
Bitcoin and Cryptocurrency Technologies (available for free) or at Amazon by A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder
Blockchain and Decentralized Systems by P. Kravchenko
Mastering Monero (available for free) by SerHack & Monero Community
How to DeFi (available for free) by Darren Lau, Daryl Lau, Teh Sze Jin, Kristian Kho, Erina Azmi, TM Lee,Bobby Ong
Zero to Monero (available for free) by Kurt M. Alonso, Sarang Noether, Koe
Mastering Lightning Network (available for free on Github) by A. Antonopoulos, Olaoluwa Osuntokun, Rene Pickhardt
Programming Bitcoin (avaialble fore free on Github) or at Amazon by Jimmy Song
This Machine Kills Secrets by Andy Greenberg
Crypto, by Steven Levy
Newsletters
Bitcoin
Ethereum
DeFi
Crypto in general
[Delphi Digital]
History of Crypto
The Byzantine General Problem, by Lamport, Shostak, Peace
How to Timestamp a Digital Document, by S. Haber, S. Stornetta
Dinning Cryptographers Problem, by David Chaum
Pre-Bitcoin Digital Currencies
Blind signatures for untraceable payments, by David Chaum
Hashcash - A Denial of Service Counter-Measure, by Adam Back
Bit gold, by Nick Szabo
RPOW , by Hal Finney
History (Open Source)
The Cathedral and the Bazaar , by Eric Steven Raymond
Homesteading the Noosphere, by Eric Steven Raymond
The Wikipedia Revolution, by Andrew Lih
Cypherpunks
A Cypherpunk's Manifesto, by Eric Hughes
The Crypto Anarchist Manifesto, by Timothy C. May
Cyphernomicon, by Timothy C. May
This Machine Kills Secrets, by Andy Greenberg
Crypto, by Steven Levy
Bitcoin
Bitcoin: A Peer-to-Peer Electronic Cash System, by Satoshi Nakamoto
Annotated: "Bitcoin: A Peer-to-Peer Electronic Cash System", by Satoshi Nakamoto, Balaji Srinivasan, Et al.
How the Bitcoin protocol actually works, by Michael Nielsen
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?, by Grant Sanderson
Mastering Bitcoin, by Andreas M. Antonopoulos
Why Is It Taking 20 Minutes to Mine This Bitcoin Block?, by Russell O’Connor
OP_RETURN and the Future of Bitcoin, by Rich Apodaca
Bitcoin Script
Seeds & Addresses
Colored Coins
Mastercoin
Mastercoin: A Second-Generation Protocol on the Bitcoin Blockchain, by Vitalik Buterin
Mastercoin Complete Specification Version 1.0, by J.R. Willett
Ethereum
Ethereum in 25 Minutes, by Vitalik Buterin
Ethereum Yellow Paper, by Gav Would, et al
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
Smart Contracts
The Idea of Smart Contracts, by Nick Szabo
Solidity
Solidity Bytecode and Opcode Basics, by Bernard Peh
Smart Contract Platforms
RSK TRON EOS Dfinity NEO Zilliqua Holochain Hyperledger
Layer 2 Solutions
Alternative Cryptocurrencies
Consensus Algorithms
Proof-of-Work
Proof-of-Stake
On Stake and Consensus, by Andrew Poelstra
Cryptocurrencies without Proof of Work, by Iddo Bentov, Ariel Gabizon, Alex Mizrahi
Others
The Raft Consensus Algorithm, by Diego Ongaro, Et al.
Raft: Understandable Distributed Consensus, by Ben Johnson
In Search of an Understandable Consensus Algorithm (Extended Version), by Diego Ongaro, John Ousterhout
Tangaroa: a Byzantine Fault Tolerant Raft, by Christopher Copeland, Hongxia Zhong
Neat Algorithms - Paxos, by Harry Brundage
The Paxos Algorithm, by Luis Quesada Torres
The Part-Time Parliament, by Leslie Lamport
Blockchain Interoperability
Blockchain in Enterprise
ICOs
STOs
DeFi
NFTs
Cryptography
Everything you need to know about cryptography in 1 hour, by Colin Percival
$5 wrench attack, by Randall Munroe
Communication Theory of Secrecy Systems, by Claude Elwood Shannon
New Directions in Cryptography, by Whitfield Diffie, Martin E. Hellman
Blind signatures for untraceable payments, by David Chaum
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, by Ronald Linn Rivest, Adi Shamir, Leonard Adleman
How RSA Works With Examples, by Barry Steyn
Why RSA Works: Three Fundamental Questions Answered, by Barry Steyn
Cryptographic Hash VS MAC: What You Need To Know, by Barry Steyn
End to End Encryption (E2EE) (Computerphile), by Mike Pound
Secret Key Exchange (Diffie-Hellman) (Computerphile), by Mike Pound
Privacy
Privacy Coins
Zcash
Monero
ZCoin Grin
Beam
MimbleWimble
PIVX
Onion Routing
Onion Routing (Computerphile), by Mike Pound
EXTRA BITS: Onion Routing (Computerphile), by Mike Pound
Tor: The Second-Generation Onion Router, by Roger Dingledine, Nick Mathewson, Paul Syverson
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services, by Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas
Zero-Knowledge Proofs
Zero Knowledge Proofs (Computerphile), by Alberto Sonnino
Zero Knowledge Proofs, by Scott Twombly
Introduction to zkSNARKs, by Christian Reitwiessner
Bulletproofs: Short Proofs for Confidential Transactions and More, by Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
Security
Other
Abstract Algebra
Abstract Algebra (Socratica), by Liliana de Castro, Michael Harrison, Hatch Harrison
Behavioral Science
Please, not another bias! An evolutionary take on behavioural economics, by Jason Collins
The Hidden Agenda of the Political Mind, by Jason Weeden, Robert Kurzban
Hierarchy in the Forest, by Christopher Boehm
The Biology of Moral Systems, by Richard D. Alexander
See also: Handicap Principle
Content Addressing
MAGNET v0.1 (Draft Tech Overview/Spec), by Gordon Mohr
A URN Namespace For Identifiers Based on Cryptographic Hashes by Peter Thiemann
Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data, by Tobias Kuhn, Michel Dumontier
See also: Distributed Hash Tables
Distributed Computing
Perspectives on the CAP Theorem, by Seth Gilbert, Nancy A. Lynch
Notes on Distributed Systems for Young Bloods, by Jeff Hodges
Immutability Changes Everything (video), by Pat Helland
Immutability Changes Everything (paper), by Pat Helland
Kafka: a Distributed Messaging System for Log Processing, by Jay Kreps, Neha Narkhede, Jun Rao
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan
Dynamo: Amazon’s Highly Available Key-value Store , by Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, Werner Vogels
MapReduce: Simplified Data Processing on Large Clusters, by Jeffrey Dean, Sanjay Ghemawat
The Chubby Lock Service for Loosely-Coupled Distributed Systems, by Mike Burrows
So, you want to trace your distributed system? Key design insights from years of practical experience by Raja R. Sambasivan, Rodrigo Fonseca, Ilari Shafer, Gregory R. Ganger
Dapper, a Large-Scale Distributed Systems Tracing Infrastructure, by Benjamin H. Sigelman, Luiz André Barroso, Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, Chandan Shanbhag
Queues Don't Fix Overload, by Fred Hebert
See also: Consensus, Peer-to-Peer Networks
Distributed Hash Tables
Kademlia: A Peer-to-peer Information System Based on the XOR Metric, by Petar Maymounkov, David Mazières
Error Detection and Correction
Information Theory & Coding (Computerphile), by David Brailsford
Multiple Dimension Error Correction (Computerphile), by David Brailsford
The Perfect Code (Computerphile), by David Brailsford
EXTRA BITS: More on Perfect Codes (Computerphile), by David Brailsford
Handicap Principle
The Handicap Principle: A Missing Piece of Darwin's Puzzle, by Amotz Zahavi, Avishag Zahavi
Hash Lists
How to Time-Stamp a Digital Document, by Stuart Haber, W. Scott Stornetta
Identity
Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, by Warwick Ford, Michael S. Baum
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities , by Vittorio Bertocci, Garrett Serack, Caleb Baker
7 Laws of Identity by Kim Camerons,
Getting Started with OAuth 2.0, by Ryan Boyd
Digital Identity, by Phillip J. Windley
Identity Management: A Primer, by Graham Williamson, David Yip, Ilan Sharoni, Kent Spaulding
Money
Shelling Out: The Origins of Money, by Nick Szabo
The Ascent of Money: A Financial History of The World (Documentary), by Niall Ferguson
Island Money, by Michael F. Bryan
The Rai Stones are huge stone wheels used as currency on the island of Yap, by Boban Docevski
Peer-to-Peer Networks
Understanding Churn in Peer-to-Peer Networks, by Daniel Stutzbach, Reza Rejaie
See also: Bitcoin, Bit Gold, Distributed Hash Tables
Randomness
Uniform Non-Random Random Numbers, by Timothy Masters
TIFU by using Math.random(), by Mike Malone
The Lava Lamps That Help Keep The Internet Secure, by Tom Scott
Selfish Mining Attack
Majority is not Enough: Bitcoin Mining is Vulnerable, by Ittay Eyal and Emin G ̈un Sirer
See also: Proof-of-Work
Sybil Attack
The Sybil Attack, by John R. Douceur
Tamper Detection
The Playdough Protocols, by Nick Szabo
See also: Hash Lists
Trust Networks
Advogato's Trust Metric, by Raph Levien
Attack Resistant Trust Metrics, by Raph Levien
Advogato Has Failed, by Bryan Taylor
Eigenmorality, by Scott Aaronson
See also: Sybil Attack
Worse Is Better
The Rise of “Worse is Better”, by Richard P. Gabriel
Worse Is Better, by Richard P. Gabriel
“RethinkDB: why we failed” (Worse Is Better: RethinkDB vs MongoDB), by Slava Akhmechet
Lisp: Good News, Bad News, How to Win Big, by Richard P. Gabriel
Last updated