The topic of this article may not meet Wikipedia's notability guidelines for products and services. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted. Find sources: "CryptoNote" – news · newspapers · books · scholar · JSTOR(December 2022) (Learn how and when to remove this message)
CryptoNote
Original author(s)
Nicolas van Saberhagen
Repository
github.com/cryptonotefoundation/cryptonote
Written in
C++
Operating system
Windows, Unix-like, OS X
Type
Cryptocurrency, anonymity
License
MIT License
Website
cryptonote.org[dead link]
CryptoNote is an application layer protocol designed for use with cryptocurrencies that aims to solve specific problems identified in Bitcoin.[1] Namely:
Traceability of transactions
The proof-of-work function (see Bitcoin network)
Irregular emission
Hardcoded constants
Bulky scripts
Financial privacy
The protocol powers several decentralized privacy-oriented cryptocurrencies, including Monero, MobileCoin and Safex Cash.[2][3]
Nothing is known about the original author of CryptoNote, "Nicolas van Saberhagen."[4] Its mathematical component and motivation are described in the article "CryptoNote Whitepaper", released in two editions: in 2012 and in 2013.[5][1] Launched in the summer of 2012, Bytecoin was the first cryptocurrency to use this technology. Later, several teams launched their networks, based on the Bytecoin code.
^ ab"CryptoNote v 2.0" (PDF). cryptonote.org. Archived from the original (PDF) on 2020-10-28. Retrieved 2018-12-21.
^"Forkmaps". forkmaps. Archived from the original on 2018-08-04. Retrieved 2019-03-21.
technology adoption curve theory. Monero (cryptocurrency) "CryptoNote v 2.0" (PDF). cryptonote.org. Archived from the original (PDF) on 2020-10-28. Retrieved...
Some other hashing algorithms that are used for proof-of-work include CryptoNote, Blake, SHA-3, and X11. Another method is called the proof-of-stake scheme...
balances, or transaction histories. The protocol is open source and based on CryptoNote, a concept described in a 2013 white paper authored by Nicolas van Saberhagen...
Social Science Research Network (SSRN). Date accessed August 28, 2017. "Crypto: The basics". FCA. February 9, 2023. Retrieved July 4, 2023. Dixon, Lance...
and iPhone use Ed25519 keys for IKEv2 mutual authentication Botan Crypto++ CryptoNote cryptocurrency protocol Dropbear SSH I2Pd implementation of EdDSA...
Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations'...
with relatively small median input size such estimate may be acceptable. CryptoNote implements O ( n ) {\displaystyle O(n)} ring signature scheme by Fujisaki...
mechanics build on Stellar (for consensus) and Monero (for privacy), using CryptoNote alongside zero-knowledge proofs to hide details of users' transactions...
held, while outwardly behaving as a convert. Crypto-Jews, Crypto-Christians, Crypto-Muslims and Crypto-Pagans are historical examples of the latter....
BBC. Bartlett, Jamie (December 15, 2019). "The £4bn OneCoin scam: how crypto-queen Dr Ruja Ignatova duped ordinary people out of billions — then went...
other individuals were raided that night, later being referred to as "the Crypto Six." While the FBI's main justification for this raid was that scammers...
had its business-to-consumer division, WagerLogic, sold to a third party. CryptoLogic was founded by brothers Andrew Rivkin and Mark Rivkin in 1995 from...
signatures, which has become a key component of numerous systems such as Cryptonote and Monero (cryptocurrency). Subsequently, together with her advisor Shafi...
Me to Buy Crypto?". Listen Notes. Retrieved November 12, 2022. Deconstructed. "Is Crypto a Big Scam? - Deconstructed (podcast)". Listen Notes. Retrieved...
anti-money-laundering and cybersecurity regulations, in the department's first crypto enforcement action. In May 2022 Alameda Research disclosed a 7.6% share...
Cracking the Courtyard Crypto" (PDF). Studies in Intelligence. 43 (1). Stein, David D. (July 23, 2018). "Cracking the Courtyard Crypto". CIA. Freedom of Information...
Release Notes". "Cryptocat". crypto.cat. Archived from the original on 18 July 2016. Retrieved 29 March 2016. "Cryptocat - Security". crypto.cat. Archived...
company that formerly operated a fraud-ridden cryptocurrency exchange and crypto hedge fund. The exchange was founded in 2019 by Sam Bankman-Fried and Gary...
fields. The IACR was organized at the initiative of David Chaum at the CRYPTO '82 conference. The IACR organizes and sponsors three annual flagship conferences...
The 2022 Miami Grand Prix (officially known as the Formula 1 Crypto.com Miami Grand Prix 2022) was a Formula One motor race that was held on May 8, 2022...
tokens were stolen by an unknown hacker. The event sparked a debate in the crypto-community about whether Ethereum should perform a contentious "hard fork"...