You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please, join our community today!

Page 2 of 2 FirstFirst 12
Results 11 to 12 of 12

Thread: Didn't see that coming - AMD rallies on cryptocurrency mining demand

  1. #11
    Join Date
    Jan 2011
    The land of beer and chocolate
    Thumbs Up
    Received: 246
    Given: 324
    Quote Originally Posted by smeyer0028 View Post
    The idea
    of hash code mining is that it is much harder for cheaters to
    aggregate huge computing power. Mining computing power is a
    large user of energy though.
    The idea is to replace huge computing power need which is expensive to the stake in the total amount of ethereum which is also expensive. Indeed a lot of research is happening on keeping the system fair. As in a proof of stake system the next block generator is determined at pseuso-random according to one's stake it can in theory be made more resistent to 51% attacks as you have in the proof of work system.

    0 Not allowed!
    Trust me ...
    I know what I am doing.

  2. #12
    Join Date
    Sep 2011
    Thumbs Up
    Received: 27
    Given: 2
    I do not think you are seeing public ledger algorithms
    correctly. There is a long history of block chain algorithms
    called multi-party secret sharing that were all seen as too easy
    to hack using approaches where many of the participants colluded
    to cheat. The Bitcoin break through was to see that by encouraging
    people to spend computer resources on mining to make sure a majority
    of the computing power is honest makes it much harder to hack public
    ledgers (multiple spends of coins and alteration of transaction
    history - ownership). It is very unlikely that some formal
    algorithm is going to replace brute force coin mining (called

    I think I come from a different more skeptical world of
    cryptography (I am not a cryptographer. I keep up with cryptography
    because the combinatorics in Verilog simulators is similar to that
    used in cryptography). For example algorithm security proofs do
    not take into account the attack of obtaining (stealing) the
    encryption IC net list.

    There is a paper by Adi Shamir's (the S in RSA) student Dorit Ron
    that I think shows that no algorithm can replace coin mining
    ( Paper also has an argument
    that controlling only 29% of the computing power is enough to
    compromise Bitcoin security. Shamir is even more skeptical of block
    chain security than I am. Here is a list of his 2016 predictions for
    the future of computer security:

    0 Not allowed!

Page 2 of 2 FirstFirst 12

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts