Chapter 1. Introduction to Bitcoin
Table 1.1. Some modern hyperinflations. Source: Wikipedia
Table 1.2. Cost of sending 5,374 PHP from Sweden to the Philippines
Table 1.3. Feasibility of different fee levels
Table 1.4. Market capitalization of a few cryptocurrencies as of 11 November 2018
Chapter 2. Cryptographic hash functions and digital signatures
Table 2.1. How key ingredients of the cookie token system and the Bitcoin system relate
Table 2.2. Release notes, cookie tokens 1.0
Table 2.3. Finding an input with the same hash as “Hello!” is nearly impossible.
Table 2.4. A few cryptographic hash functions. Some old ones have been deemed insecure.
Chapter 3. Addresses
Chapter 4. Wallets
Chapter 5. Transactions
Table 5.1. Transactions replace emails to Lisa and rows in the spreadsheet.
Chapter 6. The blockchain
Chapter 7. Proof of work
Table 7.1. Comparing the lucky number system with the proof-of-work system
Table 7.3. Probability that an attacker catches up, from the attacker’s perspective
Table 7.4. The block subsidy might be halved, but its value depends on the cookie token value.
Chapter 8. Peer-to-peer network
Table 8.1. The shared folder is ditched in favor of a peer-to-peer network.
Table 8.2. The shared folder has been ditched in favor of a peer-to-peer network.
Chapter 9. Transactions revisited
Table 9.1. Sequence numbers are used to enable or disable various features.
Chapter 10. Segregated witness
Table 10.1. Space occupied by signature script data of different typical transactions
Table 10.2. Maximum block sizes for different ratios of witness data
Chapter 11. Bitcoin upgrades
Table 11.2. Features deployed an using incremented block version