L
- LevelDB, Quick Glossary
- libraries, web3.js-Emerald Platform
- library contract, Quick Glossary, Contract Definition
- libsecp256k1 cryptographic library, Elliptic Curve Libraries
- light/lightweight client, Quick Glossary, Should I Run a Full Node?
- LLL, Introduction to Ethereum High-Level Languages
- local blockchain simulation, Local Blockchain Simulation Advantages and Disadvantages
- logs, Vyper, Reading and Writing Data
M
- Mastering Ethereum Token (see METoken)
- Merkle Patricia Tree, Quick Glossary
- Merkle, Ralph, Public Key Cryptography and Cryptocurrency
- message call, Quick Glossary, Transaction/message call context
- message communication protocols, Decentralized Message Communications Protocols
- message, defined, Quick Glossary
- MetaMask, Choosing an Ethereum Wallet
- METoken (Mastering Ethereum Token)
- Metropolis, Quick Glossary, Ethereum’s Four Stages of Development
- MEW (see MyEtherWallet)
- migrations, Truffle migrations—understanding deployment scripts-Truffle migrations—understanding deployment scripts
- miners, Quick Glossary, Recording on the Blockchain
- mining farms, Recording on the Blockchain
- Mist (browser-based wallet), Quick Glossary, Mist
- mnemonic code words, Wallet Technology Overview
- mobile (smartphone) wallets, Mobile (Smartphone) Wallets
- modifiers, Modifiers
- msg object, Transaction/message call context
- multicast (broadcast) oracle, Oracle Design Patterns
- multiple-signature (multisig) transactions, Multiple-Signature (Multisig) Transactions
- mutex, Preventative Techniques
- MyCrypto (wallet), MyCrypto
- MyEtherWallet (MEW), Choosing an Ethereum Wallet, MyEtherWallet (MEW), MyCrypto
N
- Namehash algorithm, The Namehash algorithm
- names/naming (see ENS (Ethereum Name Service))
- National Institute of Science and Technology (NIST), Ethereum’s Cryptographic Hash Function: Keccak-256
- negative gas, Life Cycle of a Smart Contract
- neighbor nodes, Transaction Propagation
- Nethereum, Nethereum
- networks (Ethereum)
- NFTs (see nonfungible tokens)
- NIST (National Institute of Science and Technology), Ethereum’s Cryptographic Hash Function: Keccak-256
- node
- Node.js, Installing the Truffle framework
- non-fungible tokens (NFTs), Tokens and Fungibility
- non-repudiation, The Elliptic Curve Digital Signature Algorithm
- nonces, The Transaction Nonce-Concurrency, Transaction Origination, and Nonces
- concurrency, Concurrency, Transaction Origination, and Nonces
- confirmation, Gaps in Nonces, Duplicate Nonces, and Confirmation
- defined, Quick Glossary
- duplicated, Gaps in Nonces, Duplicate Nonces, and Confirmation
- gaps in sequence of, Gaps in Nonces, Duplicate Nonces, and Confirmation
- keeping track of, Keeping Track of Nonces
- transaction origination, Concurrency, Transaction Origination, and Nonces
- world state and, Ethereum State
- nondeterministic (random) wallets, Wallet Technology Overview-Nondeterministic (Random) Wallets
- nonfungible tokens (NFTs)
O
- offline signing, Separating Signing and Transmission (Offline Signing)-Separating Signing and Transmission (Offline Signing)
- ommer, defined, Quick Glossary
- one-way functions, Public Keys, Cryptographic Hash Functions
- open source licenses, Using Code Examples
- OpenAddressLottery honey pot, Real-World Examples: OpenAddressLottery and CryptoRoulette Honey Pots
- OpenSSL cryptographic library, Elliptic Curve Libraries
- OpenZeppelin, Preventative Techniques, Contract Libraries, OpenZeppelin-OpenZeppelin
- oracles, Oracles-Conclusions
- and data authentication, Data Authentication
- broadcast/multicast, Oracle Design Patterns
- client interfaces in Solidity, Oracle Client Interfaces in Solidity-Oracle Client Interfaces in Solidity
- computation oracles, Computation Oracles-Computation Oracles
- data authentication with, Data Authentication
- decentralized, Decentralized Oracles
- design patterns, Oracle Design Patterns-Oracle Design Patterns
- immediate-read, Oracle Design Patterns
- publish-subscribe, Oracle Design Patterns
- reasons for using, Why Oracles Are Needed
- request-response, Oracle Design Patterns
- use cases/examples, Oracle Use Cases and Examples
- Oraclize, Data Authentication, Computation Oracles, Oracle Client Interfaces in Solidity-Oracle Client Interfaces in Solidity
- overflow, Arithmetic Over/Underflows-Real-World Examples: PoWHC and Batch Transfer Overflow (CVE-2018–10299)
P
- Parity
- Parity Multisig Wallet
- passphrases, Optional passphrase in BIP-39
- password stretching algorithm, Nondeterministic (Random) Wallets
- payable function, Functions
- payment, Transaction Value and Data
- PBKDF2 function, From mnemonic to seed
- Populus, Testing Smart Contracts
- PoS (see proof of stake)
- PoW (see proof of work)
- PoWHC (see Proof of Weak Hands Coin)
- pre-image, Cryptographic Hash Functions
- prime factorization, Public Key Cryptography and Cryptocurrency
- private blockchain, Local Blockchain Simulation Advantages and Disadvantages
- private function, Functions
- private keys, Keys and Addresses, Private Keys-Generating a Private Key from a Random Number
- PRNG (pseudorandom number generator) contracts, Real-World Example: PRNG Contracts
- proof of stake (PoS)
- Proof of Weak Hands Coin (PoWHC), Real-World Examples: PoWHC and Batch Transfer Overflow (CVE-2018–10299)
- proof of work (PoW)
- propagation of transactions, Transaction Propagation
- prototype of a function, Transmitting a Data Payload to an EOA or Contract
- proxy, ZeppelinOS
- pseudorandom number generator (PRNG) contracts, Real-World Example: PRNG Contracts
- public function, Functions
- public key cryptography, Public Key Cryptography and Cryptocurrency-Public Key Cryptography and Cryptocurrency
- public key recovery, The Signature Prefix Value (v) and Public Key Recovery
- public keys, Public Keys-Elliptic Curve Libraries
- public testnets, Public Testnet Advantages and Disadvantages
- publish-subscribe oracles, Oracle Design Patterns
- pure function, Functions
R
- race conditions, Race Conditions/Front Running
- (see also front-running security threat; reentrancy attack)
- random (nondeterministic) wallets, Wallet Technology Overview-Nondeterministic (Random) Wallets
- random numbers, private key generation from, Generating a Private Key from a Random Number
- receipt, defined, Quick Glossary
- Recursive Length Prefix (RLP), Quick Glossary, The Structure of a Transaction
- reentrancy attacks, Reentrancy-Real-World Example: The DAO
- reentrancy bug, The Reentrancy Bug
- reentrancy honey pot security threat, Real-World Example: Reentrancy Honey Pot-Real-World Example: Reentrancy Honey Pot
- reference specification, Components of a Blockchain
- registering a name, Registering a Name-Registering a Name
- Remix IDE, Compiling the Faucet Contract, Creating the Contract on the Blockchain-Creating the Contract on the Blockchain
- remote clients, Remote Ethereum Clients-Mist
- Remote Procedure Call (RPC) commands (see JSON-RPC API)
- request-response oracles, Oracle Design Patterns
- require function, Error Handling (assert, require, revert)
- resolver contracts, Resolvers
- revert function, Error Handling (assert, require, revert)
- reward, defined, Quick Glossary
- RLP (Recursive Length Prefix), Quick Glossary, The Structure of a Transaction
- root seeds, creating HD wallets from, Creating an HD Wallet from the Seed
- Ropsten Test Network, Getting Some Test Ether
- RPC (Remote Procedure Call) commands (see JSON-RPC API)
- Rubixi pyramid scheme, Real-World Example: Rubixi
- runtime bytecode, Contract Deployment Code
- Rust, Software Requirements for Building and Running a Client (Node)
S
- SafeMath library, Preventative Techniques
- salts, From mnemonic to seed
- Satoshi Nakamoto, Quick Glossary
- SchellingCoin protocol, Decentralized Oracles
- Schneier, Bruce, Cryptographic Hash Functions
- SECG (Standards for Efficient Cryptography Group), Generating a Public Key
- secp256k1 elliptic curve, Elliptic Curve Cryptography Explained-Elliptic Curve Cryptography Explained, Generating a Public Key, Elliptic Curve Libraries
- secret keys, Quick Glossary
- Secure Hash Algorithm (see SHA entries)
- security (smart contracts), Smart Contract Security-Conclusions
- arithmetic over/underflow threat, Arithmetic Over/Underflows-Real-World Examples: PoWHC and Batch Transfer Overflow (CVE-2018–10299)
- best practices, Security Best Practices
- block timestamp manipulation threat, Block Timestamp Manipulation-Real-World Example: GovernMental
- constructors and contract name-change threat, Constructors with Care
- contract libraries for, Contract Libraries
- default visibility specifier threat, Default Visibilities-Real-World Example: Parity Multisig Wallet (First Hack)
- DELEGATECALL opcode threat, DELEGATECALL-Real-World Example: Parity Multisig Wallet (Second Hack)
- denial of service attacks, Denial of Service (DoS)-Real-World Examples: GovernMental
- entropy illusion threat, Entropy Illusion
- external contract referencing threat, External Contract Referencing-Real-World Example: Reentrancy Honey Pot
- floating-point problem, Floating Point and Precision-Real-World Example: Ethstick
- race conditions/front running threat, Race Conditions/Front Running-Real-World Examples: ERC20 and Bancor
- reentrancy attacks, Reentrancy-Real-World Example: The DAO
- risks and antipatterns, Security Risks and Antipatterns-Preventative Techniques
- short address/parameter attack, Short Address/Parameter Attack
- token standard implementation choices, Security by Maturity
- tx.origin authentication threat, Tx.Origin Authentication-Preventative Techniques
- unchecked CALL return value threat, Unchecked CALL Return Values-Real-World Example: Etherpot and King of the Ether
- unexpected ether threat, Unexpected Ether-Further Examples
- uninitialized storage pointer threat, Uninitialized Storage Pointers-Real-World Examples: OpenAddressLottery and CryptoRoulette Honey Pots
- seeded wallets (see deterministic wallets)
- seeds, Quick Glossary
- selfdestruct function, Contract Constructor and selfdestruct, The Vulnerability
- SELFDESTRUCT opcode, Life Cycle of a Smart Contract, Contract Constructor and selfdestruct
- semantic versioning, Selecting a Version of Solidity
- Serenity, Quick Glossary, Ethereum’s Four Stages of Development
- Serpent, Quick Glossary, Introduction to Ethereum High-Level Languages
- SGX (Software Guard eXtensions), Data Authentication
- SHA (Secure Hash Algorithm), Quick Glossary
- SHA-3 Hash Function, Ethereum’s Cryptographic Hash Function: Keccak-256
- shell commands, Software Requirements for Building and Running a Client (Node)
- short address/parameter attack, Short Address/Parameter Attack
- side effects, Introduction to Ethereum High-Level Languages
- single-instance private blockchain, Local Blockchain Simulation Advantages and Disadvantages
- singleton, Quick Glossary
- smart contracts, Smart Contracts and Solidity-Conclusions
- ABI, The Ethereum Contract ABI-Selecting a Solidity Compiler and Language Version
- addressing an existing instance, Addressing an existing instance
- and Ethereum high-level languages, Introduction to Ethereum High-Level Languages-Introduction to Ethereum High-Level Languages
- as DApp backend, Backend (Smart Contract), Auction DApp: Backend Smart Contracts-DApp governance
- basics, Externally Owned Accounts (EOAs) and Contracts
- building with Solidity, Building a Smart Contract with Solidity-Conclusions
- call method, Raw call, delegatecall-Raw call, delegatecall
- calling other contracts from within a contract, Calling Other Contracts (send, call, callcode, delegatecall)-Raw call, delegatecall
- constructor function, Contract Constructor and selfdestruct
- creating new instance, Creating a new instance
- defined, Quick Glossary, Quick Glossary, What Is a Smart Contract?
- delegatecall method, Raw call, delegatecall
- deleting, Life Cycle of a Smart Contract
- EOAs compared to, Smart Contracts and Solidity
- ether and, Introducing the World Computer
- gas considerations, Gas Considerations-Estimating Gas Cost
- inheritance, Contract Inheritance-Contract Inheritance
- life cycle of, Life Cycle of a Smart Contract
- on-platform libraries, Contract Libraries
- security, Smart Contract Security-Conclusions
- Solidity and, Building a Smart Contract with Solidity-Compiling with the Solidity Compiler (solc)
- test frameworks, Testing Smart Contracts-Ganache: A Local Test Blockchain
- transmitting data payload to, Transmitting a Data Payload to an EOA or Contract-Transmitting a Data Payload to an EOA or Contract
- transmitting value to, Transmitting Value to EOAs and Contracts
- using Truffle to deploy, Using truffle to deploy a contract
- Vyper and (see Vyper)
- smartphones (see mobile (smartphone) wallets)
- Snowden, Edward, Ethereum’s Cryptographic Hash Function: Keccak-256
- Software Guard eXtensions (SGX), Data Authentication
- solc (Solidity compiler), Compiling with the Solidity Compiler (solc)
- Solidity, Introduction to Ethereum High-Level Languages
- adding constructor/selfdestruct to faucet example, Adding a Constructor and selfdestruct to Our Faucet Example
- building a smart contract with, Building a Smart Contract with Solidity-Conclusions
- calling other contracts from within a contract, Calling Other Contracts (send, call, callcode, delegatecall)-Raw call, delegatecall
- class inheritance, Class Inheritance
- compiling source file to EVM bytecode, Compiling Solidity to EVM Bytecode-Compiling Solidity to EVM Bytecode
- contract constructor function, Contract Constructor and selfdestruct
- contract definition, Contract Definition
- contract destruction, Contract Constructor and selfdestruct
- contract inheritance, Contract Inheritance-Contract Inheritance
- data types, Data Types-Data Types
- default visibility specifier problem, Default Visibilities-Real-World Example: Parity Multisig Wallet (First Hack)
- defined, Quick Glossary
- development environment, Development Environment
- downloading/installing, Download and Install
- error handling, Error Handling (assert, require, revert)
- event objects, Events-Catching events
- faucet.sol and, A Simple Contract: A Test Ether Faucet
- function modifiers, Function Modifiers
- function ordering, Function and Variable Ordering
- function overloading, Function Overloading
- function syntax, Functions
- functions, Functions-Functions
- gas considerations, Gas Considerations-Estimating Gas Cost
- modifiers, Modifiers
- oracle client interfaces in, Oracle Client Interfaces in Solidity-Oracle Client Interfaces in Solidity
- predefined global variables/functions, Predefined Global Variables and Functions-Built-in functions
- programming with, Programming with Solidity-Raw call, delegatecall
- selecting compiler and language version, Selecting a Solidity Compiler and Language Version
- selecting version of, Selecting a Version of Solidity
- selfdestruct function, Contract Constructor and selfdestruct
- smart contracts and, Building a Smart Contract with Solidity-Compiling with the Solidity Compiler (solc)
- variable ordering, Function and Variable Ordering
- variable typecasting, Variable Typecasting
- Vyper compared to, Comparison to Solidity-Preconditions and Postconditions
- writing a simple program in, Writing a Simple Solidity Program
- Solidity compiler (solc), Compiling with the Solidity Compiler (solc)
- Solidity inline assembly, Quick Glossary, Inline Assembly
- Spurious Dragon, Quick Glossary, Ethereum’s Four Stages of Development, Transaction Signing in Practice
- SputnikVM, SputnikVM
- Standards for Efficient Cryptography Group (SECG), Generating a Public Key
- Status (mobile wallet), Mobile (Smartphone) Wallets
- storage (see data storage)
- storage pointers, uninitialized, Uninitialized Storage Pointers-Real-World Examples: OpenAddressLottery and CryptoRoulette Honey Pots
- stub, Contract Definition
- submarine sends, Preventative Techniques
- SUICIDE (see SELFDESTRUCT opcode)
- Swarm, Swarm
- Swarm hash, resolving a name to, Resolving a Name to a Swarm Hash (Content)
- synchronization (see fast synchronization) (see first synchronization)
- szabo, defined, Quick Glossary
- Szabo, Nick, What Is a Smart Contract?
T
- Tangerine Whistle, Quick Glossary, Ethereum’s Four Stages of Development
- TEEs (trusted execution environments), Data Authentication
- terminal applications, Software Requirements for Building and Running a Client (Node)
- test ether
- test frameworks
- test vector, determining hash functions with, Which Hash Function Am I Using?
- testnet
- throw function, Error Handling (assert, require, revert)
- TLSNotary proofs, Data Authentication
- token standards (generally), Using Token Standards-Security by Maturity
- tokens, Tokens-Conclusions
- counterparty risk, Counterparty Risk
- ERC20 standard, The ERC20 Token Standard-ERC20 implementations
- ERC223 standard proposal, ERC223: A Proposed Token Contract Interface Standard
- ERC721 non-fungible token standard, ERC721: Non-fungible Token (Deed) Standard-ERC721: Non-fungible Token (Deed) Standard
- ERC777 standard proposal, ERC777: A Proposed Token Contract Interface Standard-ERC777 hooks
- fungibility, Tokens and Fungibility
- gas and, Issues with ERC20 Tokens
- ICOs and, Tokens and ICOs
- intrinsicality, Tokens and Intrinsicality
- on Ethereum, Tokens on Ethereum-ERC721: Non-fungible Token (Deed) Standard
- reasons to adopt, Utility Tokens: Who Needs Them?
- uses of, How Tokens Are Used-How Tokens Are Used
- using token standards, Using Token Standards-Security by Maturity
- utility/equity types, Using Tokens: Utility or Equity-Utility Tokens: Who Needs Them?
- Town Crier, Data Authentication
- transaction call, Transaction/message call context
- transaction fees (see gas)
- transaction receipt, Events
- transactions, Transactions-Conclusions
- as atomic, Life Cycle of a Smart Contract
- basic structure, The Structure of a Transaction
- contract creation, Special Transaction: Contract Creation-Special Transaction: Contract Creation
- defined, Quick Glossary
- digital signatures and, Digital Signatures-Raw Transaction Creation with EIP-155
- gas, Transaction Gas-Transaction Gas
- multiple-signature, Multiple-Signature (Multisig) Transactions
- nonces, The Transaction Nonce-Concurrency, Transaction Origination, and Nonces
- propagation of, Transaction Propagation
- raw transaction creation with EIP-1455, Raw Transaction Creation with EIP-155
- raw transaction creation/signing, Raw Transaction Creation and Signing
- recipient of, Transaction Recipient
- recording on the blockchain, Recording on the Blockchain
- separating signing and transmission, Separating Signing and Transmission (Offline Signing)-Separating Signing and Transmission (Offline Signing)
- signature prefix value (v) and public key recovery, The Signature Prefix Value (v) and Public Key Recovery
- signing in practice, Transaction Signing in Practice
- smart contracts and, Life Cycle of a Smart Contract
- transmitting data payload to EOAs and contracts, Transmitting a Data Payload to an EOA or Contract-Transmitting a Data Payload to an EOA or Contract
- transmitting value to EOAs and contract, Transmitting Value to EOAs and Contracts
- value and data fields, Transaction Value and Data-Transmitting a Data Payload to an EOA or Contract
- warnings and cautions, Ethereum Addresses and Transactions in this Book
- transfer function
- trapdoor functions, Public Key Cryptography and Cryptocurrency
- tree structure, navigating, Navigating the HD wallet tree structure
- TrueBit, Computation Oracles
- Truffle, Truffle-Using the Truffle console
- as test framework, Testing Smart Contracts
- configuring, Configuring truffle
- console, Using the Truffle console-Using the Truffle console
- contract deployment with, Using truffle to deploy a contract
- creating a project directory, Creating a truffle project directory-Creating a truffle project directory
- defined, Quick Glossary
- installing, Installing the Truffle framework
- integrating a prebuilt Truffle project, Integrating a prebuilt Truffle project (Truffle Box)
- interacting with METoken via Truffle console, Interacting with METoken using the Truffle console-Interacting with METoken using the Truffle console
- migrations, Truffle migrations—understanding deployment scripts-Truffle migrations—understanding deployment scripts
- running test transaction with, Catching events
- Truffle Box, Integrating a prebuilt Truffle project (Truffle Box)
- Trust Wallet, Mobile (Smartphone) Wallets
- trusted execution environments (TEEs), Data Authentication
- trustless systems, Oracles
- Turing completeness
- Turing, Alan, Ethereum and Turing Completeness
- tx object, Transaction context
- tx.origin authentication security threat
- typecasting, Variable Typecasting
- typographical conventions, Conventions Used in This Book
U
- unchecked CALL return value security threat, Unchecked CALL Return Values-Real-World Example: Etherpot and King of the Ether
- underflow, Arithmetic Over/Underflows-Real-World Examples: PoWHC and Batch Transfer Overflow (CVE-2018–10299), The Vulnerability
- unexpected ether
- uninitialized storage pointers security threat, Uninitialized Storage Pointers-Real-World Examples: OpenAddressLottery and CryptoRoulette Honey Pots
- Universal Turing machine (UTM), Ethereum and Turing Completeness
- user interface, as DApp frontend, Frontend (Web User Interface)
- utilities, EthereumJS helpeth: A Command-Line Utility
- utility currency, ether as, Compared to Bitcoin
- utility tokens
- UTM (Universal Turing machine), Ethereum and Turing Completeness
V
- value field, Transaction Value and Data-Transmitting Value to EOAs and Contracts
- variable declarations, ordering of, Function and Variable Ordering
- version pragma, Selecting a Solidity Compiler and Language Version
- Vickrey auctions, Vickrey auctions
- view (function keyword), Functions
- visibility specifiers, Default Visibilities-Real-World Example: Parity Multisig Wallet (First Hack)
- vulnerabilities, Vulnerabilities and Vyper
- (see also security; specific attacks/vulnerabilities)
- Vyper, Introduction to Ethereum High-Level Languages, Smart Contracts and Vyper-Conclusions
- class inheritance, Class Inheritance
- compilation, Compilation
- contract vulnerabilities and, Vulnerabilities and Vyper
- decorators, Decorators
- defined, Quick Glossary
- function ordering, Function and Variable Ordering
- function overloading, Function Overloading
- modifiers, Modifiers
- overflow protection, Protecting Against Overflow Errors at the Compiler Level
- preconditions/postconditions, Preconditions and Postconditions
- reading/writing data, Reading and Writing Data
- Solidity compared to, Comparison to Solidity-Preconditions and Postconditions
- variable ordering, Function and Variable Ordering
- variable typecasting, Variable Typecasting
W
- wallets, Wallets-Conclusions
- best practices for, Wallet Best Practices-Navigating the HD wallet tree structure
- browser wallets, Browser Wallets
- choosing, Choosing an Ethereum Wallet
- cold-storage wallets, Extended public and private keys
- creating HD wallets from root seed, Creating an HD Wallet from the Seed
- defined, Quick Glossary, Choosing an Ethereum Wallet, Wallets
- deterministic, Wallet Technology Overview, Deterministic (Seeded) Wallets
- duress wallet, Optional passphrase in BIP-39
- Emerald Wallet, Choosing an Ethereum Wallet
- HD (see hierarchical deterministic wallets)
- Jaxx, Choosing an Ethereum Wallet, Mobile (Smartphone) Wallets, Jaxx
- MetaMask (see MetaMask)
- Mist, Quick Glossary, Mist
- mnemonic codes (BIP-39), Seeds and Mnemonic Codes (BIP-39), Mnemonic Code Words (BIP-39)-Working with mnemonic codes
- mobile, Mobile (Smartphone) Wallets
- MyCrypto, MyCrypto
- MyEtherWallet, Choosing an Ethereum Wallet, MyEtherWallet (MEW), MyCrypto
- nondeterministic, Wallet Technology Overview-Nondeterministic (Random) Wallets
- Parity Multisig Wallet hacks, Real-World Example: Parity Multisig Wallet (Second Hack)-Real-World Example: Parity Multisig Wallet (Second Hack), Real-World Example: Parity Multisig Wallet (First Hack)
- remote clients compared to, Should I Run a Full Node?
- technology overview, Wallet Technology Overview-Seeds and Mnemonic Codes (BIP-39)
- testnet ether and, Getting Some Test Ether
- Trust, Mobile (Smartphone) Wallets
- warnings and cautions
- web user interface, as DApp frontend, Frontend (Web User Interface)
- web3, Quick Glossary, The Third Age of the Internet, Decentralized Applications (DApps)
- web3.js, web3.js
- web3.py, web3.py
- web3j, web3j
- wei, defined, Quick Glossary
- Whisper, Quick Glossary, Decentralized Message Communications Protocols
- withdrawal of funds from contract, Withdrawing from Our Contract-Withdrawing from Our Contract
- Wood, Dr. Gavin, Quick Glossary
- world computer, Ethereum as, What Is Ethereum?, Introducing the World Computer
- world state, Ethereum State