This document is targeted at technical people, who are looking to gain a deep understand of the concepts behind cryptocurrencies, blockchain and decentralized technologies.
- Books
- Newsletters
- History of Crypto
- Cypherpunks
- Bitcoin
- Ethereum
- Smart Contracts
- Solidity
- Smart Contract Platforms
- Layer 2 Solutions
- Alternative cryptocurrencies
- Consensus Algorithms
- Blockchain Interoperability
- Blockchain in Enterprise
- ICOs
- STOs
- DeFi
- NFTs
- Cryptography
- Privacy
- Zero-Knowledge Proofs
- Security
- Other
- Mastering Bitcoin available for free on Github or at Amazon by A. Antonopoulos
- Mastering Ethereum (available for free on Github), or at Amazon by A. Antonopoulos and Gavin Wood
- Bitcoin and Cryptocurrency Technologies (available for free) or at Amazon by A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder
- Blockchain and Decentralized Systems by P. Kravchenko
- Mastering Monero (available for free) by SerHack & Monero Community
- How to DeFi (available for free) by Darren Lau, Daryl Lau, Teh Sze Jin, Kristian Kho, Erina Azmi, TM Lee,Bobby Ong
- Zero to Monero (available for free) by Kurt M. Alonso, Sarang Noether, Koe
- Mastering Lightning Network (available for free on Github) by A. Antonopoulos, Olaoluwa Osuntokun, Rene Pickhardt
- Programming Bitcoin (avaialble fore free on Github) or at Amazon by Jimmy Song
- This Machine Kills Secrets by Andy Greenberg
- Crypto, by Steven Levy
- The Byzantine General Problem, by Lamport, Shostak, Peace
- How to Timestamp a Digital Document, by S. Haber, S. Stornetta
- Dinning Cryptographers Problem, by David Chaum
- Blind signatures for untraceable payments, by David Chaum
- eCash Bitcoin wiki
- An introduction to ecash
- Hashcash - A Denial of Service Counter-Measure, by Adam Back
- Bit gold, by Nick Szabo
- b-money, an anonymous, distributed electronic cash system, by Wei Dai
- B-money - Bitcoin Wiki
- RPOW , by Hal Finney
- The Cathedral and the Bazaar , by Eric Steven Raymond
- Homesteading the Noosphere, by Eric Steven Raymond
- The Wikipedia Revolution, by Andrew Lih
- A Cypherpunk's Manifesto, by Eric Hughes
- The Crypto Anarchist Manifesto, by Timothy C. May
- Cyphernomicon, by Timothy C. May
- This Machine Kills Secrets, by Andy Greenberg
- Crypto, by Steven Levy
- Bitcoin: A Peer-to-Peer Electronic Cash System, by Satoshi Nakamoto
- Annotated: "Bitcoin: A Peer-to-Peer Electronic Cash System", by Satoshi Nakamoto, Balaji Srinivasan, Et al.
- How the Bitcoin protocol actually works, by Michael Nielsen
- Ever wonder how Bitcoin (and other cryptocurrencies) actually work?, by Grant Sanderson
- Mastering Bitcoin, by Andreas M. Antonopoulos
- Why Is It Taking 20 Minutes to Mine This Bitcoin Block?, by Russell O’Connor
- OP_RETURN and the Future of Bitcoin, by Rich Apodaca
- Explanation of what an OP_RETURN transaction looks like
- Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela, Wikileaks, photos, and Python software by Ken Shirriff
- Bitcoin Explorer Symphony 2.0.
- Script on Bitcoin Wiki
- Script Playground
- Bitcoin Script for Dummies
- Installing Bitcoin Core
- Bitcoin Developer Guide
- Blockchain Demo
- Mastercoin: A Second-Generation Protocol on the Bitcoin Blockchain, by Vitalik Buterin
- Mastercoin Complete Specification Version 1.0, by J.R. Willett
- Ethereum in 25 Minutes, by Vitalik Buterin
- Ethereum White Paper
- Ethereum Yellow Paper, by Gav Would, et al
- Ethereum Beige Paper: Rewrite of the Yellowpaper in non-Yellowpaper syntax, by Micah Dameron
- All the writings of Vitalik Buterin
- Learning ETH resources
- Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
-
by Nick Szabo
- What's Solidity
- Solidity Bytecode and Opcode Basics, by Bernard Peh
RSK TRON EOS Dfinity NEO Zilliqua Holochain Hyperledger
- On Stake and Consensus, by Andrew Poelstra
- Cryptocurrencies without Proof of Work, by Iddo Bentov, Ariel Gabizon, Alex Mizrahi
- The Raft Consensus Algorithm, by Diego Ongaro, Et al.
- Raft: Understandable Distributed Consensus, by Ben Johnson
- In Search of an Understandable Consensus Algorithm (Extended Version), by Diego Ongaro, John Ousterhout
- Tangaroa: a Byzantine Fault Tolerant Raft, by Christopher Copeland, Hongxia Zhong
- Neat Algorithms - Paxos, by Harry Brundage
- The Paxos Algorithm, by Luis Quesada Torres
- The Part-Time Parliament, by Leslie Lamport
-
Cryptography
-
Everything you need to know about cryptography in 1 hour, by Colin Percival
-
$5 wrench attack, by Randall Munroe
-
Communication Theory of Secrecy Systems, by Claude Elwood Shannon
-
New Directions in Cryptography, by Whitfield Diffie, Martin E. Hellman
-
Blind signatures for untraceable payments, by David Chaum
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, by Ronald Linn Rivest, Adi Shamir, Leonard Adleman
-
How RSA Works With Examples, by Barry Steyn
-
Why RSA Works: Three Fundamental Questions Answered, by Barry Steyn
-
Cryptographic Hash VS MAC: What You Need To Know, by Barry Steyn
-
End to End Encryption (E2EE) (Computerphile), by Mike Pound
-
Secret Key Exchange (Diffie-Hellman) (Computerphile), by Mike Pound
Zcash
Monero
ZCoin Grin
Beam
MimbleWimble
PIVX
- Onion Routing (Computerphile), by Mike Pound
- EXTRA BITS: Onion Routing (Computerphile), by Mike Pound
- Tor: The Second-Generation Onion Router, by Roger Dingledine, Nick Mathewson, Paul Syverson
- Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services, by Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas
- Garlic Routing
- Complex History and Overview of ZKP),
- Zero Knowledge Proofs (Computerphile), by Alberto Sonnino
- Zero Knowledge Proofs, by Scott Twombly
- Introduction to zkSNARKs, by Christian Reitwiessner
- Bulletproofs: Short Proofs for Confidential Transactions and More, by Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
-
by Liliana de Castro, Michael Harrison, Hatch Harrison
- Please, not another bias! An evolutionary take on behavioural economics, by Jason Collins
- The Hidden Agenda of the Political Mind, by Jason Weeden, Robert Kurzban
- Hierarchy in the Forest, by Christopher Boehm
- The Biology of Moral Systems, by Richard D. Alexander
- See also: Handicap Principle
- Magnet URI Project
- MAGNET v0.1 (Draft Tech Overview/Spec), by Gordon Mohr
- Magnet URI scheme (Wikipedia),
- A URN Namespace For Identifiers Based on Cryptographic Hashes by Peter Thiemann
- IETF RFC 6920: Naming Things with Hashes
- Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data, by Tobias Kuhn, Michel Dumontier
- BIP 122
- HTTP Extensions for a Content-Addressable Web
- IETF RFC 2397: The "data" URL scheme
- Hash URI Specification
- See also: Distributed Hash Tables
- Introduction to Distributed System Design
- Perspectives on the CAP Theorem, by Seth Gilbert, Nancy A. Lynch
- The Log: What every software engineer should know about real-time data's unifying abstraction, by Jay Kreps
- Notes on Distributed Systems for Young Bloods, by Jeff Hodges
- Immutability Changes Everything (video), by Pat Helland
- Immutability Changes Everything (paper), by Pat Helland
- Kafka: a Distributed Messaging System for Log Processing, by Jay Kreps, Neha Narkhede, Jun Rao
- Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan
- Dynamo: Amazon’s Highly Available Key-value Store , by Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, Werner Vogels
- MapReduce: Simplified Data Processing on Large Clusters, by Jeffrey Dean, Sanjay Ghemawat
- The Chubby Lock Service for Loosely-Coupled Distributed Systems, by Mike Burrows
- So, you want to trace your distributed system? Key design insights from years of practical experience by Raja R. Sambasivan, Rodrigo Fonseca, Ilari Shafer, Gregory R. Ganger
- Dapper, a Large-Scale Distributed Systems Tracing Infrastructure, by Benjamin H. Sigelman, Luiz André Barroso, Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, Chandan Shanbhag
- Queues Don't Fix Overload, by Fred Hebert
- See also: Consensus, Peer-to-Peer Networks
-
Kademlia: A Peer-to-peer Information System Based on the XOR Metric,
by Petar Maymounkov, David Mazières
- Information Theory & Coding (Computerphile), by David Brailsford
- Multiple Dimension Error Correction (Computerphile), by David Brailsford
- The Perfect Code (Computerphile), by David Brailsford
- EXTRA BITS: More on Perfect Codes (Computerphile), by David Brailsford
-
The Handicap Principle: A Missing Piece of Darwin's Puzzle,
by Amotz Zahavi, Avishag Zahavi
-
How to Time-Stamp a Digital Document,
by Stuart Haber, W. Scott Stornetta
- Identity Crisis: How Identification Is Overused and Misunderstood, by Jim Harper
- Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier
- Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, by Warwick Ford, Michael S. Baum
- Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities , by Vittorio Bertocci, Garrett Serack, Caleb Baker
- 7 Laws of Identity by Kim Camerons,
- Getting Started with OAuth 2.0, by Ryan Boyd
- Digital Identity, by Phillip J. Windley
- Identity Management: A Primer, by Graham Williamson, David Yip, Ilan Sharoni, Kent Spaulding
- Shelling Out: The Origins of Money, by Nick Szabo
- The Ascent of Money: A Financial History of The World (Documentary), by Niall Ferguson
- Island Money, by Michael F. Bryan
- The Rai Stones are huge stone wheels used as currency on the island of Yap, by Boban Docevski
- Understanding Churn in Peer-to-Peer Networks, by Daniel Stutzbach, Reza Rejaie
- See also: Bitcoin, Bit Gold, Distributed Hash Tables
- Uniform Non-Random Random Numbers, by Timothy Masters
- TIFU by using Math.random(), by Mike Malone
- The Lava Lamps That Help Keep The Internet Secure, by Tom Scott
- Majority is not Enough: Bitcoin Mining is Vulnerable, by Ittay Eyal and Emin G ̈un Sirer
- See also: Proof-of-Work
-
by John R. Douceur
- The Playdough Protocols, by Nick Szabo
- See also: Hash Lists
- Advogato's Trust Metric, by Raph Levien
- Attack Resistant Trust Metrics, by Raph Levien
- Advogato Has Failed, by Bryan Taylor
- Eigenmorality, by Scott Aaronson
- See also: Sybil Attack
- The Rise of “Worse is Better”, by Richard P. Gabriel
- Worse Is Better, by Richard P. Gabriel
- “RethinkDB: why we failed” (Worse Is Better: RethinkDB vs MongoDB), by Slava Akhmechet
- Lisp: Good News, Bad News, How to Win Big, by Richard P. Gabriel
- Worse Is Better (WikiWikiWeb)