Search content
Sort by

Showing 3 of 3 results by divine_core
Post
Topic
Board Development & Technical Discussion
Re: Establishing the Trustworthiness of Nodes without External Tokens (eg Passports)
by
divine_core
on 30/01/2014, 18:31:54 UTC
Comparing the timestamps tells you how long that node should take to solve a particular puzzle, which can then be used as a reference when asking the same puzzle later. This tells you the physical make-up of the machine hasn't been swapped out and another one is just spoofing the ID.

What's the point? Anybody running a faster system can just slow it down to pretend to be the old, slower one.
Post
Topic
Board Development & Technical Discussion
Re: Euler's totient function algorithm compatible with SHA-256?
by
divine_core
on 30/01/2014, 18:10:03 UTC
Quantum computers don't actually help you find SHA256 collisions. Even if they did, you could just go up to SHA3 with 512-bit output or something.

ECDSA was probably chosen over RSA because ECDSA keys and signatures are much smaller than RSA keys and signatures, at the cost of being somewhat more computationally expensive to verify.

Your statement about "phi's relationship to scalar and vector fields" reads like nonsense to me.
Post
Topic
Board Development & Technical Discussion
Re: Euler's totient function algorithm compatible with SHA-256?
by
divine_core
on 30/01/2014, 05:57:44 UTC
I don't understand. SHA-256 has nothing to do with computing Euler's totient function, and neither does computing the GCD (well, you can use it to compute the totient function, but it's not the most efficient way). And I'm not sure how you'd use the totient function as a proof-of-work.