Index
B
- balanced trees, Merkle Trees
- balances, Transaction Outputs and Inputs
- Base58 and Base58check encoding, Base58 and Base58Check Encoding-Implementing Keys and Addresses in C++
- Basics of Lightning Technology (BOLT), Routed Payment Channels (Lightning Network)
- binary hash trees (see merkle trees)
- bitcoin
- benefits of, Writing the Bitcoin Book-Why Are There Bugs on the Cover?, Getting Your First Bitcoin
- defined, What Is Bitcoin?-What Is Bitcoin?
- getting started, Getting Started-Sending and Receiving Bitcoin
- history of, History of Bitcoin
- overview of, Transactions, Blocks, Mining, and the Blockchain-Spending the Transaction
- use cases, Bitcoin Uses, Users, and Their Stories-Bitcoin Uses, Users, and Their Stories
- Bitcoin Block Explorer, Bitcoin Overview
- Bitcoin Core
- Bitcoin Core downloads, Compiling Bitcoin Core from the Source Code
- Bitcoin Explorer (bx) commands, Bitcoin Explorer (bx) Commands-Examples of bx Command Use
- bitcoin improvement proposals
- Address Format for P2SH (BIP-13), P2SH Addresses
- Block v2, Height in Coinbase (BIP-34), BIP-34 Signaling and Activation
- CHECKHASHVERIFY (BIP-17), Coinbase Data
- CHECKLOCKTIMEVERIFY (BIP-65), Check Lock Time Verify (CLTV), BIP-9 Signaling and Activation
- CHECKSEQUENCEVERIFY (BIP-112), Relative Timelocks
- Encrypted Private Keys (BIP-38), Encrypted Private Keys (BIP-38), Paper Wallets
- Hierarchical Deterministic Wallets (BIP-32/BIP-44), Bitcoin Core: The Reference Implementation, HD Wallets (BIP-32/BIP-44)
- Mnemonic Code Words (BIP-39), Bitcoin Core: The Reference Implementation, Seeds and Mnemonic Codes (BIP-39), Mnemonic Code Words (BIP-39)-Working with mnemonic codes
- Multipurpose HD Wallet Structure (BIP-43), Wallet Best Practices
- Pay to Script Hash (BIP-16), Pay-to-Script Hash (P2SH) and Multisig Addresses, Coinbase Data
- Peer Authentication (BIP-150), Peer-to-Peer Authentication and Encryption
- Peer-to-Peer Communication Encryption (BIP-151), Peer-to-Peer Authentication and Encryption
- Relative lock-time using consensus-enforced sequence numbers (BIP-68), Relative Timelocks
- repository of, Bitcoin Improvement Proposals
- snapshot of, Bitcoin Improvement Proposals-Bitcoin Improvement Proposals
- Strict DER signatures (BIP-66), BIP-9 Signaling and Activation
- types of, Bitcoin Improvement Proposals
- Version bits with timeout and delay (BIP-9), BIP-9 Signaling and Activation
- bitcoin network
- Bitcoin Relay Networks, Bitcoin Relay Networks
- bloom filters, Bloom Filters-How SPV Nodes Use Bloom Filters
- defined, Peer-to-Peer Network Architecture
- encrypted connections, Encrypted and Authenticated Connections
- extended network activities, The Extended Bitcoin Network
- extended network discovery, Network Discovery-Network Discovery
- full nodes, Full Nodes
- node types and roles, Node Types and Roles-The Extended Bitcoin Network
- peer-to-peer architecture, Peer-to-Peer Network Architecture
- SPV nodes, Simplified Payment Verification (SPV) Nodes-Simplified Payment Verification (SPV) Nodes
- syncing the blockchain, Exchanging “Inventory”
- transaction pools, Transaction Pools
- bitcoin nodes
- defined, How it propagates
- full nodes, Full Nodes, How SPV Nodes Use Bloom Filters
- mining nodes, Node Types and Roles, Mining Nodes
- network discovery, Network Discovery-Network Discovery
- running core nodes, Running a Bitcoin Core Node-Configuring the Bitcoin Core Node
- SPV nodes, Simplified Payment Verification (SPV) Nodes-Peer-to-Peer Authentication and Encryption, Merkle Trees and Simplified Payment Verification (SPV)
- types and roles, Node Types and Roles-The Extended Bitcoin Network
- bitcoin whitepaper, Bitcoin Core: The Reference Implementation, The Bitcoin Whitepaper by Satoshi Nakamoto-License
- BitcoinAverage, Finding the Current Price of Bitcoin
- bitcoinfees (third-party service), Transaction Fees
- Bitcore, Bitcore-Wallet Examples using bitcore-lib
- Bitmask Sighash Modes, Signature Hash Types (SIGHASH)
- BitPay Insight, Bitcoin Overview
- bloat, Data Recording Output (RETURN)
- blockchain (the)
- block headers, Block Header, Constructing the Block Header
- block identifiers, Block Identifiers: Block Header Hash and Block Height
- block structure, Structure of a Block
- blockchain forks, Blockchain Forks-Blockchain Forks
- full blockchain nodes, Full Nodes
- genesis block, Mining Transactions in Blocks, Full Nodes, The Genesis Block, Coinbase Data
- linking blocks in the blockchain, Linking Blocks in the Blockchain
- merkle trees, Merkle Trees-Merkle Trees and Simplified Payment Verification (SPV), Constructing the Block Header
- nonpayment data recording, Data Recording Output (RETURN)
- overview of, Introduction
- overview of mining, Bitcoin Mining-Mining Transactions in Blocks
- syncing the blockchain, Exchanging “Inventory”
- test blockchains, Bitcoin’s Test Blockchains-Using Test Blockchains for Development
- blockchain applications
- blockchain bloat, Data Recording Output (RETURN)
- blockchain explorer sites, Bitcoin Overview
- blockchain.info, Bitcoin Overview
- BlockCypher Explorer, Bitcoin Overview
- blocks
- aggregating transactions into, Aggregating Transactions into Blocks-Coinbase Data
- assembling and selecting chains of, Assembling and Selecting Chains of Blocks-Blockchain Forks
- block hash, Exploring Blocks, Introduction, Block Identifiers: Block Header Hash and Block Height
- block height, Exploring Blocks, Introduction, Block Identifiers: Block Header Hash and Block Height
- candidate blocks, Mining Transactions in Blocks, Aggregating Transactions into Blocks
- exploring with Bitcoin Core API, Exploring Blocks
- genesis block, Mining Transactions in Blocks, Full Nodes, Introduction, The Genesis Block, Coinbase Data
- headers, Block Header, Constructing the Block Header
- linking blocks in the blockchain, Linking Blocks in the Blockchain
- mining transactions in, Mining Transactions in Blocks
- new block validation, Validating a New Block
- parent blocks, Introduction, Constructing the Block Header
- structure of, Structure of a Block
- bloom filters, Bloom Filters-How SPV Nodes Use Bloom Filters
- brainwallets, Mnemonic Code Words (BIP-39)
- build documentation, Configuring the Bitcoin Core Build
- Byzantine Generals' Problem, History of Bitcoin
C
- candidate blocks, Mining Transactions in Blocks, Aggregating Transactions into Blocks
- central trusted authority, History of Bitcoin, Transactions, Blocks, Mining, and the Blockchain, Introduction
- chain of transactions, Transaction Chains
- change addresses, Making Change
- change, making, Making Change, Transaction Outputs and Inputs
- charitable donations, Bitcoin Uses, Users, and Their Stories, Adding Fees to Transactions, Signature Hash Types (SIGHASH)
- Check Lock Time Verify (CLTV), Check Lock Time Verify (CLTV)-Check Lock Time Verify (CLTV)
- CHECKHASHVERIFY (CHV), Coinbase Data
- CHECKMULTISIG bug workaround, A bug in CHECKMULTISIG execution
- CHECKSEQUENCEVERIFY (CSV), Relative Timelocks with CSV
- child key derivation (CKD), Private child key derivation
- clearing, Sending and Receiving Bitcoin
- clients, libraries, and toolkits, Alternative Clients, Libraries, and Toolkits-Objective-C
- cloning source code, Compiling Bitcoin Core from the Source Code
- code examples, obtaining and using, Code Examples-Bitcoin Addresses and Transactions in This Book, Compiling Bitcoin Core from the Source Code
- Coin ATM Radar, Getting Your First Bitcoin
- coinbase transactions, Transaction Outputs and Inputs, Introduction, The Coinbase Transaction-Coinbase Data
- cold storage, Choosing a Bitcoin Wallet, Public child key derivation, Physical Bitcoin Storage
- collisions, Proof-of-Work Algorithm
- colored coins, Colored Coins-Colored Coins Transactions
- comments and questions, How to Contact Us
- commitment, Signature Hash Types (SIGHASH)
- Compact Block optimization, Bitcoin Relay Networks
- conditional clauses, Scripts with Flow Control (Conditional Clauses)-Using Flow Control in Scripts
- configuration options, Configuring the Bitcoin Core Node
- confirmations (see also mining and consensus; transactions)
- consensus (see mining and consensus)
- contact information, How to Contact Us
- core executables, Building the Bitcoin Core Executables
- Counterparty, Counterparty
- cryptographic puzzles, Script Construction (Lock + Unlock)
- cryptography (see also keys and addresses)
- currency creation, Bitcoin Economics and Currency Creation
- currency exchanges, Getting Your First Bitcoin
D
- data recording (nonpayment data), Data Recording Output (RETURN)
- decentralized systems
- benefits of, Why Are There Bugs on the Cover?
- bitcoin as, Writing the Bitcoin Book, Developing Bitcoin Systems Securely
- bitcoin mining and, Introduction
- bitcoin overview, Transactions, Blocks, Mining, and the Blockchain-Spending the Transaction
- vs. centralized, What Is Bitcoin?
- consensus in, History of Bitcoin, Decentralized Consensus
- in nature, Why Are There Bugs on the Cover?
- security of, Security Principles
- deflationary money, Bitcoin Economics and Currency Creation
- denial-of-service attacks, Turing Incompleteness, Consensus Attacks (see also security)
- deserialization, Transaction serialization—outputs
- deterministic initialization, The Importance of Randomness in Signatures
- deterministic wallets, Wallet Technology Overview
- development environment
- digital asset executors, Survivability
- digital asset management, Colored Coins
- digital currencies
- digital keys (see keys and addresses)
- digital notary services, Data Recording Output (RETURN), Applications from Building Blocks
- digital ownership, Counterparty
- digital signatures
- Distinguished Encoding Rules (DER), Creating a digital signature
- distributed computing, History of Bitcoin
- distributed version control systems, Compiling Bitcoin Core from the Source Code
- DOCPROOF prefix, Data Recording Output (RETURN)
- documentation, Configuring the Bitcoin Core Build
- double-spend problem, History of Bitcoin
- dumpprivkey command, Generating a private key from a random number
- dynamic fees, Transaction Fees
E
- Electrum wallet, Mnemonic Code Words (BIP-39)
- elliptic curve cryptography, Private and Public Keys, Elliptic Curve Cryptography Explained-Elliptic Curve Cryptography Explained
- Elliptic Curve Digital Signature Algorithm (ECDSA), Digital Signatures (ECDSA), ECDSA Math
- emergent consensus, Decentralized Consensus
- encryption, Keys, Addresses, Encrypted and Authenticated Connections (see also keys and addresses)
- Enhanced Padded-Order-Based Coloring (EPOBC), Colored Coins
- entropy
- EQUAL opcode, Conditional Clauses with VERIFY Opcodes
- EQUALVERIFY opcode, Conditional Clauses with VERIFY Opcodes
- Ethereum Virtual Machine (EVM), Counterparty
- exchange rates
- extended keys, Extended keys
- extrinsic asset management, Colored Coins, Counterparty
F
- Falcon Relay Network, Bitcoin Relay Networks
- Fast Internet Bitcoin Relay Engine (FIBRE), Bitcoin Relay Networks
- fees
- floating exchange rate, Finding the Current Price of Bitcoin
- flooding technique, How it propagates
- flow control, Scripts with Flow Control (Conditional Clauses)-Using Flow Control in Scripts
- forks
- blockchain fork events, Blockchain Forks-Blockchain Forks
- changing consensus rules, Hard Forks-BIP-9 Signaling and Activation
- contentious hard forks, Contentious Hard Forks
- diverging miners and difficulty, Diverging Miners and Difficulty
- hard forks, Hard Forks
- soft fork activation, Soft Fork Signaling with Block Version
- soft fork drawbacks, Criticisms of Soft Forks
- soft forks, Soft Forks
- software forks, Hard Forks: Software, Network, Mining, and Chain
- fractional values, Buying a Cup of Coffee
- full indexing option, Configuring the Bitcoin Core Node
- full-node clients, Choosing a Bitcoin Wallet, Node Types and Roles, Full Nodes
H
- halvings, Coinbase Reward and Fees
- hard forks, Contentious Hard Forks, Consensus Software Development
- hardened derivation, Hardened child key derivation
- hardware wallets, Wallet Best Practices, Public child key derivation, Hardware Wallets (see also wallets)
- Hash Time Lock Contracts (HTLC), Hash Time Lock Contracts (HTLC)
- headers, Block Header, Constructing the Block Header
- hierarchical deterministic (HD) wallets, Wallet Technology Overview, HD Wallets (BIP-32/BIP-44), Creating an HD Wallet from the Seed, HD wallet key identifier (path)
M
- mainnet, Bitcoin’s Test Blockchains
- (see also blockchain (the))
- malleability, Exploring and Decoding Transactions
- Median-Tme-Past, Median-Time-Past
- memory pools (mempools), Transaction Pools, Aggregating Transactions into Blocks
- merkle trees, Merkle Trees-Merkle Trees and Simplified Payment Verification (SPV), Constructing the Block Header
- milli-bitcoin, Buying a Cup of Coffee
- millibits, Buying a Cup of Coffee
- mining and consensus
- aggregating transactions into blocks, Aggregating Transactions into Blocks-Coinbase Data
- assembling and selecting chains of blocks, Assembling and Selecting Chains of Blocks-Blockchain Forks
- bitcoin economics and currency creation, Bitcoin Economics and Currency Creation
- coinbase transactions, Transaction Outputs and Inputs
- consensus attacks, Consensus Attacks-Consensus Attacks
- consensus rules
- consensus software development, Consensus Software Development
- constructing block headers, Constructing the Block Header
- decentralized consensus, Introduction, Decentralized Consensus
- defined, Mining the Block
- emergent consensus, Decentralized Consensus
- hashing power race, Mining and the Hashing Race-Peer-to-peer mining pool (P2Pool)
- independent transaction verification, Independent Verification of Transactions
- mining farms and pools, Bitcoin Mining
- mining nodes, Node Types and Roles, Mining Nodes
- mining rewards and fees, Introduction
- mining the block, Mining the Block-Successfully Mining the Block
- new block validation, Validating a New Block
- overview of, Bitcoin Mining-Mining Transactions in Blocks
- Proof-of-Work algorithm, History of Bitcoin, Bitcoin Mining, Node Types and Roles, Introduction, Aggregating Transactions into Blocks, Proof-of-Work Algorithm-Proof-of-Work Algorithm
- purpose of, Introduction
- rewards and fees, Transaction Fees, Coinbase Reward and Fees
- security and consensus, The Root of Trust
- mining pools, Mining Pools-Peer-to-peer mining pool (P2Pool)
- minrelaytxfee option, Transaction Fees
- mnemonic code words, Wallet Technology Overview, Seeds and Mnemonic Codes (BIP-39), Mnemonic Code Words (BIP-39)-Working with mnemonic codes
- money supply, Bitcoin Economics and Currency Creation
- multisig addresses, Pay-to-Script Hash (P2SH) and Multisig Addresses, Multisig and Governance
- multisignature scripts, Multisignature, Complex Script Example
N
- Nakamoto, Satoshi, History of Bitcoin, Bitcoin Core: The Reference Implementation, The Bitcoin Whitepaper by Satoshi Nakamoto-License
- nLocktime field, Timelocks
- nodes (see bitcoin nodes)
- nonce values, Coinbase Data, The Extra Nonce Solution
- nondeterministic wallets, Wallet Technology Overview
- nonpayment data, Data Recording Output (RETURN)
- nSequence field, Relative Timelocks with nSequence
O
- off-blockchain transactions, Developing Bitcoin Systems Securely
- offshore contract services, Bitcoin Uses, Users, and Their Stories
- opcodes
- Open Assets, Colored Coins
- open source licenses, Using Code Examples, History of Bitcoin, Bitcoin Core: The Reference Implementation, License
- OpenSSL cryptographic library, Generating a Public Key
- orphan pools, Transaction Pools
- outputs and inputs
- basics of, Transaction Inputs and Outputs
- creating outputs, Creating the Outputs
- defined, Making Change
- input components, Transaction Inputs
- input serialization, Transaction serialization—inputs
- locating and tracking inputs, Getting the Right Inputs
- output characteristics, Transaction Outputs and Inputs
- output parts, Transaction Outputs
- outputs defined, Transaction Outputs and Inputs
- structure of, Transaction serialization—outputs
P
- paper wallets, Paper Wallets-Paper Wallets, Physical Bitcoin Storage (see also wallets)
- parent blocks, Introduction, Constructing the Block Header
- parsing, Transaction serialization—outputs
- passphrases, From mnemonic to seed, Optional passphrase in BIP-39
- passwords
- Pay-to-Public-Key-Hash (P2PKH), Transaction Scripts and Script Language, Pay-to-Public-Key-Hash (P2PKH)
- Pay-to-Script-Hash (P2SH)
- payment (state) channels
- payment requests, Buying a Cup of Coffee
- PBKDF2 function, From mnemonic to seed
- peer-to-peer (P2P), Peer-to-Peer Network Architecture
- Peer-to-Peer authentication and encryption, Peer-to-Peer Authentication and Encryption
- peer-to-peer pools (P2Pool), Peer-to-peer mining pool (P2Pool)
- pool operators, Managed pools
- primitives, Building Blocks (Primitives)
- privacy, maintaining, Getting Your First Bitcoin, Bloom Filters-Peer-to-Peer Authentication and Encryption
- programmable money, Transaction Scripts and Script Language
- programmatic interface, Using Bitcoin Core’s Programmatic Interface-Using Bitcoin Core’s Programmatic Interface
- Proof of Existence, Data Recording Output (RETURN), Applications from Building Blocks
- Proof-of-Work algorithm, History of Bitcoin, Bitcoin Mining, Node Types and Roles, Introduction, Aggregating Transactions into Blocks, Proof-of-Work Algorithm-Proof-of-Work Algorithm
- propagation
- public and private keys (see also keys and addresses)
- child key derivation (CKD), Private child key derivation
- compressed private keys, Compressed private keys
- compressed public keys, Compressed public keys
- encrypted private keys, Encrypted Private Keys (BIP-38)
- extended keys, Extended keys
- hardened child key derivation, Hardened child key derivation
- key pairs, Introduction
- private key formats, Private key formats
- public child key derivation, Public child key derivation
- public key formats, Public key formats
- pybitcointools, Implementing Keys and Addresses in Python
- pycoin library, pycoin, ku, and tx
R
- random numbers
- redeem scripts, Pay-to-Script-Hash (P2SH), Redeem Script and Validation
- reference implementation (see Bitcoin Core)
- regtest (Regression Testing), Regtest—The Local Blockchain
- relative timelocks, Relative Timelocks-Relative Timelocks with CSV
- relay networks, Bitcoin Relay Networks
- resource requirements, Running a Bitcoin Core Node
- RETURN operator, Data Recording Output (RETURN)
- risk, balancing and diversifying, Balancing Risk
- root of trust concept, The Root of Trust
- root seeds, Creating an HD Wallet from the Seed
- routed payment channels (see Lightning Network)
S
- salts, From mnemonic to seed
- satoshi, Quick Glossary
- Satoshi client, Bitcoin Core: The Reference Implementation, Full Nodes
- satoshis, Buying a Cup of Coffee, Transaction Outputs and Inputs
- scripting
- complex script example, Complex Script Example-Complex Script Example
- data recording output, Data Recording Output (RETURN)
- flow control scripts, Scripts with Flow Control (Conditional Clauses)-Using Flow Control in Scripts
- locking scripts, Transaction Outputs, Script Construction (Lock + Unlock)
- multisignature scripts, Multisignature-A bug in CHECKMULTISIG execution
- Pay-to-Script-Hash, Pay-to-Script-Hash (P2SH)-Redeem Script and Validation
- redeem scripts, Pay-to-Script-Hash (P2SH)
- Script language operators, constants, and symbols, Transaction Script Language Operators, Constants, and Symbols-Transaction Script Language Operators, Constants, and Symbols
- timelocks, Timelocks-Timelock Defense Against Fee Sniping
- transactions and, Transaction Scripts and Script Language-Pay-to-Public-Key-Hash (P2PKH)
- scriptPubKey, Transaction Outputs, Script Construction (Lock + Unlock)
- scriptSig, Script Construction (Lock + Unlock)
- security
- bitcoin addresses, Quick Start
- consensus attacks, Consensus Attacks-Consensus Attacks
- defense against fee-sniping, Timelock Defense Against Fee Sniping
- denial-of-service attacks, Turing Incompleteness, Consensus Attacks
- locking and unlocking scripts, Separate execution of unlocking and locking scripts
- maintaining privacy, Getting Your First Bitcoin, Bloom Filters-Peer-to-Peer Authentication and Encryption
- passwords, Configuring the Bitcoin Core Node, Encrypted Private Keys (BIP-38), Survivability
- security principles, Security Principles-The Root of Trust
- user security best practices, User Security Best Practices-Survivability
- vanity addresses, Vanity address security
- wallet selection, Choosing a Bitcoin Wallet
- segnet, Segnet—The Segregated Witness Testnet
- segwit (Segregated Witness), Segregated Witness-Economic Incentives for Segregated Witness, Segnet—The Segregated Witness Testnet
- serialization
- shell commands, Compiling Bitcoin Core from the Source Code
- SIGHASH flags, Signature Hash Types (SIGHASH)
- simple-payment-verification (SPV), Choosing a Bitcoin Wallet, Spending the Transaction, Node Types and Roles, Simplified Payment Verification (SPV) Nodes-Simplified Payment Verification (SPV) Nodes, Merkle Trees and Simplified Payment Verification (SPV)
- smart contracts, Counterparty
- sniping, Timelock Defense Against Fee Sniping
- soft forks
- source code, cloning, Compiling Bitcoin Core from the Source Code
- spending bitcoin (see also transactions)
- stateless verification, Stateless Verification
- static fees, Transaction Fees
- storage
- survivability, Survivability
- syncing, Exchanging “Inventory”
T
- targets, Proof-of-Work Algorithm, Target Representation-Retargeting to Adjust Difficulty
- terminal applications, Compiling Bitcoin Core from the Source Code
- testnet, Bitcoin’s Test Blockchains-Using testnet
- The Onion Routing network (Tor), Tor Transport
- third-party API clients, Choosing a Bitcoin Wallet, Alternative Clients, Libraries, and Toolkits-Objective-C
- timelocks
- toolkits, libraries, and clients, Alternative Clients, Libraries, and Toolkits-Objective-C
- Tor network, Tor Transport
- transaction IDs (txd), Exploring and Decoding Transactions, Transaction Inputs
- transaction IDs (txid), Transaction identifiers, How SPV Nodes Use Bloom Filters, Colored Coins Transactions
- transaction pools, Transaction Pools, Aggregating Transactions into Blocks
- transaction utility (TX), Transaction Utility (TX)-Transaction Utility (TX)
- transactions
- advanced, Multisignature-Economic Incentives for Segregated Witness
- aggregating into blocks, Aggregating Transactions into Blocks-Coinbase Data
- behind the scenes details of, Transactions—Behind the Scenes
- coinbase transactions, Transaction Outputs and Inputs, Introduction, The Coinbase Transaction-Coinbase Data
- constructing, Constructing a Transaction-Bob’s view
- database configuration options, Configuring the Bitcoin Core Node
- defined, Bitcoin Transactions, Making Change, Introduction
- digital signatures and, Digital Signatures (ECDSA)-The Importance of Randomness in Signatures
- exploring with Bitcoin Core API, Exploring and Decoding Transactions
- higher-level abstractions, Bitcoin Addresses, Balances, and Other Abstractions-Bitcoin Addresses, Balances, and Other Abstractions
- independent verification of, Independent Verification of Transactions
- off blockchain, Developing Bitcoin Systems Securely
- orphaned, Transaction Pools
- outputs and inputs, Transaction Outputs and Inputs-Adding Fees to Transactions
- overview of, Transaction Inputs and Outputs-Common Transaction Forms
- parsing, Transaction serialization—outputs
- scripts and Script language, Transaction Scripts and Script Language-Pay-to-Public-Key-Hash (P2PKH), Transaction Script Language Operators, Constants, and Symbols-Transaction Script Language Operators, Constants, and Symbols
- valid and invalid, A simple script
- warnings and cautions, Bitcoin Addresses and Transactions in This Book, Buying a Cup of Coffee
- Turing incompleteness, Turing Incompleteness
- txindex option, Configuring the Bitcoin Core Node
- typographical conventions, Conventions Used in This Book
U
- unlocking scripts, Script Construction (Lock + Unlock)
- unspent transaction outputs (UTXO), Transaction Outputs and Inputs, Transaction Inputs, Data Recording Output (RETURN)
- use cases
- buying coffee, Quick Start-Sending and Receiving Bitcoin, Buying a Cup of Coffee-Spending the Transaction, Exploring and Decoding Transactions-Using Bitcoin Core’s Programmatic Interface, Transactions in Detail-Transaction serialization—inputs, Adding Fees to Transactions, Pay-to-Public-Key-Hash (P2PKH), Serialization of signatures (DER)-Bitcoin Addresses, Balances, and Other Abstractions, Transaction locktime limitations-Check Lock Time Verify (CLTV), Using Flow Control in Scripts, Pay-to-Witness-Public-Key-Hash (P2WPKH)-Pay-to-Witness-Public-Key-Hash inside Pay-to-Script-Hash, Aggregating Transactions into Blocks, Consensus Attacks
- charitable donations, Bitcoin Uses, Users, and Their Stories, Adding Fees to Transactions, Signature Hash Types (SIGHASH)
- import/export, Bitcoin Uses, Users, and Their Stories, Pay-to-Script-Hash (P2SH)-Pay-to-Script-Hash (P2SH), Complex Script Example-Complex Script Example, Pay-to-Witness-Script-Hash (P2WSH)-Pay-to-Witness-Script-Hash (P2WSH), Pay-to-Witness-Script-Hash inside Pay-to-Script-Hash
- mining for bitcoin, Bitcoin Uses, Users, and Their Stories, Bitcoin Mining, Mining Nodes-Mining the Block, Successfully Mining the Block-Successfully Mining the Block
- offshore contract services, Bitcoin Uses, Users, and Their Stories, Spending the Transaction, Multisignature addresses and P2SH
- retail sales, Bitcoin Uses, Users, and Their Stories, Consensus Attacks-Consensus Attacks
- user security best practices, User Security Best Practices-Survivability
- web store, Bitcoin Uses, Users, and Their Stories, Using a Bitcoin Wallet-Using a Bitcoin Wallet, Using an Extended Public Key on a Web Store-Using an Extended Public Key on a Web Store
- UTXO sets, Transaction Outputs and Inputs, Transaction Inputs, Data Recording Output (RETURN)