List of Tables

Chapter 1. Introduction to Bitcoin

Table 1.1. Some modern hyperinflations. Source: Wikipedia

Table 1.2. Cost of sending 5,374 PHP from Sweden to the Philippines

Table 1.3. Feasibility of different fee levels

Table 1.4. Market capitalization of a few cryptocurrencies as of 11 November 2018

Chapter 2. Cryptographic hash functions and digital signatures

Table 2.1. How key ingredients of the cookie token system and the Bitcoin system relate

Table 2.2. Release notes, cookie tokens 1.0

Table 2.3. Finding an input with the same hash as “Hello!” is nearly impossible.

Table 2.4. A few cryptographic hash functions. Some old ones have been deemed insecure.

Table 2.5. Adding “Email to Lisa” as a key concept

Table 2.6. Release notes, cookie tokens 2.0

Chapter 3. Addresses

Table 3.1. Nothing new in the concept table

Table 3.2. Release notes, cookie tokens 3.0

Chapter 4. Wallets

Table 4.1. Nothing new in the concept table

Table 4.2. Release notes, cookie tokens 4.0

Chapter 5. Transactions

Table 5.1. Transactions replace emails to Lisa and rows in the spreadsheet.

Table 5.2. Release notes, cookie tokens 5.0

Chapter 6. The blockchain

Table 6.1. Size of merkle proofs compared to the block size and simple proof for different block sizes

Table 6.2. The spreadsheet is replaced by the blockchain. We also introduced the shared folder, which acts as a placeholder for the Bitcoin network.

Table 6.3. Release notes, cookie tokens 6.0

Chapter 7. Proof of work

Table 7.1. Comparing the lucky number system with the proof-of-work system

Table 7.2. A bad miner manipulates the last timestamp of the 2,016 blocks before a retarget. H is the first block height of a retarget period. The new target will increase by a factor of 4.

Table 7.3. Probability that an attacker catches up, from the attacker’s perspective

Table 7.4. The block subsidy might be halved, but its value depends on the cookie token value.

Table 7.5. Block signatures have been replaced by the Bitcoin concept of proof of work. Lisa has transformed into one of several miners.

Table 7.6. Release notes, cookie tokens 7.0

Chapter 8. Peer-to-peer network

Table 8.1. The shared folder is ditched in favor of a peer-to-peer network.

Table 8.2. The shared folder has been ditched in favor of a peer-to-peer network.

Table 8.3. Release notes, cookie tokens 8.0

Chapter 9. Transactions revisited

Table 9.1. Sequence numbers are used to enable or disable various features.

Chapter 10. Segregated witness

Table 10.1. Space occupied by signature script data of different typical transactions

Table 10.2. Maximum block sizes for different ratios of witness data

Chapter 11. Bitcoin upgrades

Table 11.1. The restaurant can make a hard fork by adding meat to its dish or a soft fork by restricting the food to vegan.

Table 11.2. Features deployed an using incremented block version