Buy
$52.00 with 20 percent savings $52.00
Learn more
These promotions will be applied to this item:
Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.
Rent
$13.98 $13.98
Today through selected date:
Rental price is determined by end date.
Your Memberships & Subscriptions

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Illustrated Edition, Kindle Edition
An authoritative introduction to the exciting new technologies of digital money
Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more.
- An essential introduction to the new technologies of digital currency
- Covers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much more
- Features an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slides
- Also suitable for use with the authors' Coursera online course
- Electronic solutions manual (available only to professors)
- ISBN-13978-1400884155
- EditionIllustrated
- PublisherPrinceton University Press
- Publication dateJuly 19, 2016
- LanguageEnglish
- File size7.7 MB
See all supported devices
Kindle E-Readers
- Kindle Oasis (9th Generation)
- All New Kindle E-reader
- All New Kindle E-reader (11th Generation)
- Kindle Paperwhite (5th Generation)
- Kindle (11th Generation, 2024 Release)
- Kindle
- Kindle Scribe, 1st generation (2024 release)
- Kindle Paperwhite (10th Generation)
- Kindle Paperwhite (12th Generation)
- Kindle Oasis
- Kindle Voyage
- All new Kindle paperwhite
- Kindle Touch
- Kindle Paperwhite (11th Generation)
- Kindle (10th Generation)
- Kindle Scribe (1st Generation)
- Kindle Oasis (10th Generation)
- Kindle Paperwhite
Fire Tablets
- Fire HD 8 (8th Generation)
- Fire 7 (9th Generation)
- Fire HD 8 (10th Generation)
- Fire HD 10 (11th Generation)
- Fire HD 10 (9th Generation)
- Fire 7 (12th Generation)
- Fire HD 10 Plus
- Fire HD 8 Plus
- Fire HD 8 (12th Generation)
Free Kindle Reading Apps
- Kindle for Android Phones
- Kindle for Android Tablets
- Kindle for PC
- Kindle for iPhone
- Kindle for Web
- Kindle for iPad
- Kindle for Mac
Customers who bought this item also bought
Editorial Reviews
Review
"For people interested in the inner workings of Bitcoin and other crypto-currencies, this is an excellent book." ― Choice
"This book is a very nice introduction to Bitcoin, its structure, how it can be used (and possibly abused), and how it might evolve in the future. . . . The authors have a relaxed tone and this book could easily be incorporated into an undergraduate curriculum."---Jeffrey Putnam, Association for Computing Machinery Computing Reviews
"Honorable Mention for the 2017 PROSE Award in Computing and Information Sciences, Association of American Publishers"
Review
"Among this book's many features are lots of nice, concrete examples and pleasant anecdotes, as well as a highly readable and enjoyable history of cryptocurrencies. Strongly recommended."―Tyler Moore, University of Tulsa
From the Back Cover
"Block chain technology is set to disrupt many different industries. If you want to get up to speed on this fast-moving technology, this book should be your first stop."--Campbell R. Harvey, Duke University
"Among this book's many features are lots of nice, concrete examples and pleasant anecdotes, as well as a highly readable and enjoyable history of cryptocurrencies. Strongly recommended."--Tyler Moore, University of Tulsa
About the Author
Excerpt. © Reprinted by permission. All rights reserved.
Bitcoin and Cryptocurrency Technologies
A Comprehensive Introduction
By Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven GoldfederPRINCETON UNIVERSITY PRESS
Copyright © 2016 Princeton University PressAll rights reserved.
ISBN: 978-0-691-17169-2
Contents
PREFACE, vii,FOREWORD The Long Road to Bitcoin JEREMY CLARK, ix,
CHAPTER 1 Introduction to Cryptography and Cryptocurrencies, 1,
CHAPTER 2 How Bitcoin Achieves Decentralization, 27,
CHAPTER 3 Mechanics of Bitcoin, 51,
CHAPTER 4 How to Store and Use Bitcoins, 76,
CHAPTER 5 Bitcoin Mining, 104,
CHAPTER 6 Bitcoin and Anonymity, 138,
CHAPTER 7 Community, Politics, and Regulation, 168,
CHAPTER 8 Alternative Mining Puzzles, 190,
CHAPTER 9 Bitcoin as a Platform, 213,
CHAPTER 10 Altcoins and the Cryptocurrency Ecosystem, 242,
CHAPTER 11 Decentralized Institutions: The Future of Bitcoin?, 272,
CONCLUSION, 286,
ACKNOWLEDGMENTS, 287,
ABOUT THE AUTHORS, 289,
INDEX, 291,
CHAPTER 1
Introduction to Cryptography and Cryptocurrencies
All currencies need some way to control supply and enforce various security properties to prevent cheating. In fiat currencies, organizations like central banks control the money supply and add anticounterfeiting features to physical currency. These security features raise the bar for an attacker, but they don't make money impossible to counterfeit. Ultimately, law enforcement is necessary for stopping people from breaking the rules of the system.
Cryptocurrencies too must have security measures that prevent people from tampering with the state of the system and from equivocating (that is, making mutually inconsistent statements to different people). If Alice convinces Bob that she paid him a digital coin, for example, she should not be able to convince Carol that she paid her that same coin. But unlike fiat currencies, the security rules of cryptocurrencies need to be enforced purely technologically and without relying on a central authority.
As the word suggests, cryptocurrencies make heavy use of cryptography. Cryptography provides a mechanism for securely encoding the rules of a cryptocurrency system in the system itself. We can use it to prevent tampering and equivocation, as well as to encode, in a mathematical protocol, the rules for creation of new units of the currency. Thus, before we can properly understand cryptocurrencies, we need to delve into the cryptographic foundations that they rely on.
Cryptography is a deep academic research field using many advanced mathematical techniques that are notoriously subtle and complicated. Fortunately, Bitcoin relies on only a handful of relatively simple and well-known cryptographic constructions. In this chapter, we specifically study cryptographic hashes and digital signatures, two primitives that prove to be useful for building cryptocurrencies. Later chapters introduce more complicated cryptographic schemes, such as zero-knowledge proofs, that are used in proposed extensions and modifications to Bitcoin.
Once the necessary cryptographic primitives have been introduced, we'll discuss some of the ways in which they are used to build cryptocurrencies. We'll complete this chapter with examples of simple cryptocurrencies that illustrate some of the design challenges that need to be dealt with.
1.1. CRYPTOGRAPHIC HASH FUNCTIONS
The first cryptographic primitive that we need to understand is a cryptographic hash function. A hash function is a mathematical function with the following three properties:
• Its input can be any string of any size.
• It produces a fixed-sized output. For the purpose of making the discussion in this chapter concrete, we will assume a 256-bit output size. However, our discussion holds true for any output size, as long as it is sufficiently large.
• It is efficiently computable. Intuitively this means that for a given input string, you can figure out what the output of the hash function is in a reasonable amount of time. More technically, computing the hash of an n-bit string should have a running time that is O (n).
These properties define a general hash function, one that could be used to build a data structure, such as a hash table. We're going to focus exclusively on cryptographic hash functions. For a hash function to be cryptographically secure, we require that it has the following three additional properties: (1) collision resistance, (2) hiding, and (3) puzzle friendliness.
We'll look more closely at each of these properties to gain an understanding of why it's useful to have a function that satisfies them. The reader who has studied cryptography should be aware that the treatment of hash functions in this book is a bit different from that in a standard cryptography textbook. The puzzle-friendliness property, in particular, is not a general requirement for cryptographic hash functions, but one that will be useful for cryptocurrencies specifically.
Property 1: Collision Resistance
The first property that we need from a cryptographic hash function is that it is collision resistant. A collision occurs when two distinct inputs produce the same output. A hash function H(·) is collision resistant if nobody can find a collision (Figure 1.1). Formally:
Collision resistance. A hash function H is said to be collision resistant if it is infeasible to find two values, x and y, such that x ? y, yet H (x) = H (y).
Notice that we said "nobody can find" a collision, but we did not say that no collisions exist. Actually, collisions exist for any hash function, and we can prove this by a simple counting argument. The input space to the hash function contains all strings of all lengths, yet the output space contains only strings of a specific fixed length. Because the input space is larger than the output space (indeed, the input space is infinite, while the output space is finite), there must be input strings that map to the same output string. In fact, there will be some outputs to which an infinite number of possible inputs will map (Figure 1.2).
Now, to make things even worse, we said that it has to be impossible to find a collision. Yet there are methods that are guaranteed to find a collision. Consider the following simple method for finding a collision for a hash function with a 256-bit output size: pick 2256 + 1 distinct values, compute the hashes of each of them, and check whether any two outputs are equal. Since we picked more inputs than possible outputs, some pair of them must collide when you apply the hash function.
The method above is guaranteed to find a collision. But if we pick random inputs and compute the hash values, we'll find a collision with high probability long before examining 2256 + 1 inputs. In fact, if we randomly choose just 2130 + 1 inputs, it turns out there's a 99.8 percent chance that at least two of them are going to collide. That we can find a collision by examining only roughly the square root of the number of possible outputs results from a phenomenon in probability known as the birthday paradox. In the homework questions (see the online supplementary material for this book, which can be found at http://press.princeton.edu/titles/10908.html), we examine this in more detail.
This collision-detection algorithm works for every hash function. But, of course, the problem is that it takes a very long time to do. For a hash function with a 256-bit output, you would have to compute the hash function 2256 + 1 times in the worst case, and about 2128 times on average. That's of course an astronomically large number — if a computer calculates 10,000 hashes per second, it would take more than one octillion (1027) years to calculate 2128 hashes! For another way of thinking about this, we can say that if every computer ever made by humanity had been computing since the beginning of the universe, the odds that they would have found a collision by now are still infinitesimally small. So small that it's far less than the odds that the Earth will be destroyed by a giant meteor in the next two seconds.
We have thus found a general but impractical algorithm to find a collision for any hash function. A more difficult question is: Is there some other method that could be used on a particular hash function to find a collision? In other words, although the generic collision detection algorithm is not feasible to use, there may be some other algorithm that can efficiently find a collision for a specific hash function.
Consider, for example, the following hash function:
H(x) = x mod 2256
This function meets our requirements of a hash function as it accepts inputs of any length, returns a fixed-sized output (256 bits), and is efficiently computable. But this function also has an efficient method for finding a collision. Notice that this function just returns the last 256 bits of the input. One collision, then, would be the values 3 and 3 + 2256. This simple example illustrates that even though our generic collision detection method is not usable in practice, there are at least some hash functions for which an efficient collision detection method does exist.
Yet for other hash functions, we don't know whether such methods exist. We suspect that they are collision resistant. However, no hash functions have been proven to be collision resistant. The cryptographic hash functions that we rely on in practice are just functions for which people have tried really, really hard to find collisions and haven't yet succeeded. And so we choose to believe that those are collision resistant. (In some cases, such as the hash function known as MD5, collisions were eventually found after years of work, resulting in the function being deprecated and phased out of practical use.)
APPLICATION: MESSAGE DIGESTS
Now that we know what collision resistance is, the logical question is: What is it useful for? Here's one application: If we know that two inputs x and y to a collision-resistant hash function H are different, then it's safe to assume that their hashes H(x) and H(y) are different — if someone knew an x and y that were different but had the same hash, that would violate our assumption that H is collision resistant.
This argument allows us to use hash outputs as a message digest. Consider SecureBox, an authenticated online file storage system that allows users to upload files and to ensure their integrity when they download them. Suppose that Alice uploads really large files, and she wants to be able to verify later that the file she downloads is the same as the one she uploaded. One way to do that would be to save the whole big file locally, and directly compare it to the file she downloads. While this works, it largely defeats the purpose of uploading it in the first place; if Alice needs to have access to a local copy of the file to ensure its integrity, she can just use the local copy directly.
Collision-resistant hashes provide an elegant and efficient solution to this problem. Alice just needs to remember the hash of the original file. When she later downloads the file from SecureBox, she computes the hash of the downloaded file and compares it to the one she stored. If the hashes are the same, then she can conclude that the file is indeed the same one she uploaded, but if they are different, then Alice can conclude that the file has been tampered with. Remembering the hash thus allows her to detect not only accidental corruption of the file during transmission or on SecureBox's servers but also intentional modification of the file by the server. Such guarantees in the face of potentially malicious behavior by other entities are at the core of what cryptography gives us.
The hash serves as a fixed-length digest, or unambiguous summary, of a message. This gives us a very efficient way to remember things we've seen before and to recognize them again. Whereas the entire file might have been gigabytes long, the hash is of fixed length — 256 bits for the hash function in our example. This greatly reduces our storage requirement. Later in this chapter and throughout the book, we'll see applications for which it's useful to use a hash as a message digest.
Property 2: Hiding
The second property that we want from our hash functions is that it is hiding. The hiding property asserts that if we're given the output of the hash function y = H(x), there's no feasible way to figure out what the input, x, was. The problem is that this property can't be true in the form stated. Consider the following simple example: we're going to do an experiment where we flip a coin. If the result of the coin flip was heads, we're going to announce the hash of the string "heads." If the result was tails, we're going to announce the hash of the string "tails."
We then ask someone, an adversary, who didn't see the coin flip, but only saw this hash output, to figure out what the string was that was hashed (we'll soon see why we might want to play games like this). In response, they would simply compute both the hash of the string "heads" and the hash of the string "tails," and they could see which one they were given. And so, in just a couple steps, they can figure out what the input was.
The adversary was able to guess what the string was because only two values of x were possible, and it was easy for the adversary to just try both of them. To be able to achieve the hiding property, there must be no value of x that is particularly likely. That is, x has to be chosen from a set that is, in some sense, very spread out. If x is chosen from such a set, this method of trying a few values of x that are especially likely will not work.
The big question is: Can we achieve the hiding property when the values that we want do not come from a spread-out set as in our "heads" and "tails" experiment? Fortunately, the answer is yes! We can hide even an input that's not spread out by concatenating it with another input that is spread out. We can now be slightly more precise about what we mean by hiding (the double vertical bar | denotes concatenation).
Hiding. A hash function H is said to be hiding if when a secret value r is chosen from a probability distribution that has high min-entropy, then, given H(r | x), it is infeasible to find x.
In information theory, min-entropy is a measure of how predictable an outcome is, and high min-entropy captures the intuitive idea that the distribution (i.e., of a random variable) is very spread out. What that means specifically is that when we sample from the distribution, there's no particular value that's likely to occur. So, for a concrete example, if r is chosen uniformly from among all strings that are 256 bits long, then any particular string is chosen with probability 1/2, which is an infinitesimally small value.
APPLICATION: COMMITMENTS
Now let's look at an application of the hiding property. In particular, what we want to do is something called a commitment. A commitment is the digital analog of taking a value, sealing it in an envelope, and putting that envelope out on the table where everyone can see it. When you do that, you've committed yourself to what's inside the envelope. But you haven't opened it, so even though you've committed to a value, the value remains a secret from everyone else. Later, you can open the envelope and reveal the value that you committed to earlier.
Commitment scheme. A commitment scheme consists of two algorithms:
• com:= commit(msg, nonce) The commit function takes a message and secret random value, called a nonce, as input and returns a commitment.
• verify(com, msg, nonce) The verify function takes a commitment, nonce, and message as input. It returns true if com == commit(msg, nonce) and false otherwise.
We require that the following two security properties hold:
• Hiding: Given com, it is infeasible to find msg.
• Binding: It is infeasible to find two pairs (msg, nonce) and (msg', nonce') such that msg ? msg' and commit(msg, nonce) = = commit(msg', nonce').
To use a commitment scheme, we first need to generate a random nonce. We then apply the commit function to this nonce together with msg, the value being committed to, and we publish the commitment com. This stage is analogous to putting the sealed envelope on the table. At a later point, if we want to reveal the value that we committed to earlier, we publish the random nonce that we used to create this commitment, and the message, msg. Now anybody can verify that msg was indeed the message committed to earlier. This stage is analogous to opening the envelope.
Every time you commit to a value, it is important that you choose a new random value nonce. In cryptography, the term nonce is used to refer to a value that can only be used once.
The two security properties dictate that the algorithms actually behave like sealing and opening an envelope. First, given com, the commitment, someone looking at the envelope can't figure out what the message is. The second property is that it's binding. This ensures that when you commit to what's in the envelope, you can't change your mind later. That is, it's infeasible to find two different messages, such that you can commit to one message and then later claim that you committed to another.
(Continues...)Excerpted from Bitcoin and Cryptocurrency Technologies by Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder. Copyright © 2016 Princeton University Press. Excerpted by permission of PRINCETON UNIVERSITY PRESS.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.
Product details
- ASIN : B01GGQJ2XW
- Publisher : Princeton University Press
- Accessibility : Learn more
- Publication date : July 19, 2016
- Edition : Illustrated
- Language : English
- File size : 7.7 MB
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Enabled
- Print length : 328 pages
- ISBN-13 : 978-1400884155
- Page Flip : Enabled
- Best Sellers Rank: #422,297 in Kindle Store (See Top 100 in Kindle Store)
- #29 in Encryption
- #51 in Computer Cryptography
- #53 in Web Encryption
- Customer Reviews:
About the author

Arvind Narayanan is a professor of computer science at Princeton and the director of the Center for Information Technology Policy. He is the coauthor of AI Snake Oil and previously co-authored a textbook on fairness and machine learning. He led the Princeton Web Transparency and Accountability Project to uncover how companies collect and use our personal information. His work was among the first to show how machine learning reflects cultural stereotypes, and his doctoral research showed the fundamental limits of de-identification. Narayanan is a recipient of the Presidential Early Career Award for Scientists and Engineers (PECASE).
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book provides a comprehensive description of the technology behind Bitcoin and is easy to read.
AI Generated from the text of customer reviews
Select to learn more
Customers appreciate the book's comprehensive coverage of cryptocurrency technology, with one customer noting it provides a thorough introduction from start to finish, while another highlights its detailed exploration of blockchain.
"...used inside the bitcoin system, but also gives a clear, intelligent discussion of such issues as the security risks, the incentives to maintain the..." Read more
"...Tough sledding to get through, but it is thorough in taking you from start to finish about crypto, how it works, and how it can be implemented in..." Read more
"...Most parts of the book are accessible to technical and non-technical people. Legal implications of Bitcoin are discussed in Chapter 7...." Read more
"This book is one of a very few that offer a clear and balanced introduction to what crytocurrencies are, how they originated, and what the future..." Read more
Customers find the book easy to read and detailed.
"...The book is really a pleasure to read, I couldn't put it down, and I've been recommending it broadly." Read more
"This book is one of a very few that offer a clear and balanced introduction to what crytocurrencies are, how they originated, and what the future..." Read more
"The first three chapters provide a pretty good explanation of how Bitcoin works on a technical level...." Read more
"This has just the right amount of detail to understand the mechanics of how bitcoin and various altcoins work, without drowning in enough details to..." Read more
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on August 28, 2017Format: HardcoverVerified PurchaseThis outstanding book gives a comprehensive description of the technology behind bitcoin and related currencies. It covers not only the programs used inside the bitcoin system, but also gives a clear, intelligent discussion of such issues as the security risks, the incentives to maintain the system, the economics of mining and mining pools, and government regulation. It goes beyond bitcoin, with a chapter or two on applications which build upon bitcoin, development of related cryptocurrencies and future research directions. This is a serious effort, suitable as an introduction to research in the subject; each chapter includes appropriate references. There is also a wonderful preface about how the technology behind bitcoin evolved over a couple of decades. The book is really a pleasure to read, I couldn't put it down, and I've been recommending it broadly.
- Reviewed in the United States on March 7, 2018Format: HardcoverVerified PurchaseDon't bother with any other book than this gem for getting up-to-speed on Blockchain Technology. Tough sledding to get through, but it is thorough in taking you from start to finish about crypto, how it works, and how it can be implemented in business and society. I ordered several other books that I thought could do the job, but Mr. Narayanan and his co-authors nail it. Yes, in some parts it can be a bit technical, which causes a bit of slowdown in reading, but it will not leave you lacking for details of how BCT works and how it can be implemented.
Hard copy that costs a bit more, but is worth it. I simply wanted to learn about BCT, and this book delivers.
- Reviewed in the United States on July 16, 2016Format: HardcoverVerified PurchaseThis book does a nice job of explaining Bitcoin and crypto-currency technologies. The start of the book discusses technologies preceding Bitcoin and why many of these systems failed. From there the building blocks of how Bitcoin evolved were discussed. These sections were excellent; describing the main innovations of Bitcoin and how they were woven together to create Bitcoin.
Wallets and mining are introduced and explained. Many different possible attack vectors on bitcoin were discussed. The balance was pretty good here between a technical discussion and a casual discussion. Most parts of the book are accessible to technical and non-technical people.
Legal implications of Bitcoin are discussed in Chapter 7. I thought sections here relied too heavily on news stories and anecdotes.
In the final chapters many different alternative coins and technologies that overlay on the Bitcoin block-chain were introduced. I was pleased to see the innovative altcoins each had something about them including Ethereum. Drawbacks of certain altcoins were discussed but overall the authors did not show any favoritism to certain coins which was nice.
I am giving the book 4-stars though because the writing in certain sections, along with word choice was not well suited for a printed book. For example Chapter 5 was entitled "Bitcoin Mining" and the first sentence of the chapter (p.104) is: "This chapter is all about mining", and the final sentence to the chapter introduction was: "In this chapter, we answer all these questions.". These sentences contain basically no information at all, and I found this pattern repeated throughout the book. In one place a technology was described as "cool".
Overall, the content is a great introduction to crypto-curriences but the authors could use some work on their penmanship.
- Reviewed in the United States on January 26, 2017Format: HardcoverVerified PurchaseThis book is one of a very few that offer a clear and balanced introduction to what crytocurrencies are, how they originated, and what the future might hold. This is not a book about bitcoin or the currency exchange markets in cryto, it is a book about the collection of technologies that make up what we now call "the blockchain" and how and why value can be stored and transferred securely and publicly on these chains.
It does not address Ethereum or programmable blockchains in any real way, but it will give you deep foundational understanding about how such a thing can possibly exist. If you care about where networked computational technologies will be going in the next 25 years start here.
- Reviewed in the United States on February 8, 2018Format: HardcoverVerified PurchaseThis book is great. If there were include much more up-to-date of ICOs, that would be excellent.
- Reviewed in the United States on December 30, 2017Format: KindleVerified PurchaseProf Felten et al have written a technical yet approachable introduction to blockchain technology and its applications (bitcoin and other cryptocurrencies). A first or second-year CS student will be comfortable with the technical portions of the book. But the general material is suitable for any audience.
My only critical comment is that much has changed in the bitcoin / cryptocurrency community since late 2015 when the book was written. It would be good to update the book to reflect current hash rates (which are 25x higher), the rise of Etherium, and the hard fork that resulted in Bitcoin Cash.
- Reviewed in the United States on May 4, 2018Format: HardcoverVerified PurchaseI highly highly recommend this book to anyone who wants to learn about Bitcoin and how the underlying technology works. The book is not ideal for someone looking to get into bitcoin just for the price appreciation but is rather meant for someone who wants to understand the economics and underlying design of Bitcoin.
No Programming pre-requisite knowledge necessary as technical details are explained very clearly.
- Reviewed in the United States on December 16, 2023Format: KindleVerified PurchaseBitcoin and tech explained at an introductory level with good examples and recommendations on its use. This book also is used with a Coursera course.
Top reviews from other countries
-
Enrique AlbertosReviewed in Spain on July 4, 2017
5.0 out of 5 stars Amena introducción a las criptomonedas
Format: HardcoverVerified PurchaseEl libro es un excelente acompañante para el curso Bitcoin and Cryptocurrency Technologies que se puede seguir en Coursera.
Se lee muy fácil, es muy ameno, y apenas requiere conocimientos previos para su comprensión.
Ofrece una introducción a las criptomonedas poniendo el foco en las tecnologías que han hecho posible el éxito del Bitcoin y describiendo los problemas que se han tenido que resolver. Sin olvidar los problemas que han tenido otras criptomonedas que han fracasado y finalmente describiendo lo que se avecina en el futuro. A la velocidad que van surgiendo novedades en este campo el libro se va quedando desfasado en sus predicciones.
Si lo que buscas es entender el exito del Bitcoin este es tu libro. Si estás intersado en otros proyectos que utilicen Block-chain como tecnología, como podría ser Ethereum, este libro se ha quedado ya obsoleto.
Existe un borrador libre del libro accesible desde Internet, es una versión previa sin revisión. En mi opinión es prefierible la versión en papel y es una buena forma de devolver a los autores el favor de regalarte un curso de ese nivel.
- GreguarReviewed in Canada on April 6, 2018
5.0 out of 5 stars Gets into the thick of it nicely.
Format: KindleVerified PurchaseVery technical, dry read, exactly what I wanted. Gets into the thick of it nicely.
- Girish V GulawaniReviewed in India on June 3, 2018
5.0 out of 5 stars A must have reference on Blockchain!
Format: HardcoverVerified PurchaseHave been tracking progress re Blockchain & it’s suitability in certain areas of my interest. Have come across just too many references, but none could explain better than Prof Arvind N & Prof Ed F. Delighted to receive their book & looking forward to get more insights through their amazing work. Thank you!
(PS. Im the Dilbert trying to get my boss to listen)
Girish V GulawaniA must have reference on Blockchain!
Reviewed in India on June 3, 2018
(PS. Im the Dilbert trying to get my boss to listen)
Images in this review
-
"maxberle"Reviewed in Germany on November 28, 2018
5.0 out of 5 stars Super!
Format: HardcoverVerified PurchaseTolles Buch, hat alle meine Fragen im beantwortet!
-
東京都民、87歳 岡田Reviewed in Japan on December 7, 2018
5.0 out of 5 stars 技術面からもビットコインの本質を知る。
Format: HardcoverVerified Purchaseビットコインはこれからの金融、政治経済の変化に強くかかわって行くと思うが、この本は技術面に付いても詳細に、多面的に述べており、ビットコインが容易ならざるものであることを分からせてくれる。この本を読むと新聞などの記事にかなり的はずれのものが多いのがわかる。