https://thogiti.github.io/2025/09/14/cross-chain-messaging-systems-mechanism-design-part1.html
#bridge 跨链博弈论分析
#bridge 跨链博弈论分析
thogiti.github.io
Coalition-Proof Attestation for Cross-Chain Messaging Systems Part 1 - Dare to Know
A practical deep dive into game theory, correlation, and mechanism design for LayerZero (split), CCIP (quorums), and Across (optimistic)Most bridges don’t fa...
https://cryptologie.net/posts/intuitions-behind-the-range-proofs-of-bulletproof/
#zk 算法 Bulletproof 内的 Range Proofs
#zk 算法 Bulletproof 内的 Range Proofs
Web3ReadList
https://blog.ethereum.org/2023/08/29/eel-spec Python 描述 #ethereum 规范
Openzeppelin
Inside Ethereum's Engine: How the Execution Layer Actually Works
Learn how Ethereum's Execution Layer Specification (EELS) works. Deep dive into EVM messages, transactions, block execution, and state transitions.
https://www.adevarlabs.com/blog/preventing-second-preimage-attacks-in-merkle-trees-a-complete-guide
Merkle Tree 的 Second Preimage Attacks
Merkle Tree 的 Second Preimage Attacks
Adevarlabs
Preventing Second Preimage Attacks in Merkle Trees: A Complete Guide | Adevar Labs
A second preimage attack in a Merkle tree occurs when an attacker proves that non-existent data exists by presenting an internal node hash as if it were a leaf. Merkle trees are widely used in DeFi for compact, gas-efficient membership proofs such as token…