Key English Chinese (Traditional)
downloads->cli_helpsupport If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monero-dev, or else check out the Hangouts page for a more complete list of contacts and chatrooms If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monero-dev, or else check out the Hangouts page for a more complete list of contacts and chatrooms
research-lab->mrl4 Improving Obfuscation in the CryptoNote Protocol Improving Obfuscation in the CryptoNote Protocol
moneropedia->entries->locally-unique-host Locally-unique host Locally-unique host
press-kit->marketing Marketing Material Marketing Material
moneropedia->entries->mining Mining Mining
moneropedia->entries->mnemonicseed Mnemonic Seed Mnemonic Seed
research-lab->mrl3 Monero is Not That Mysterious Monero is Not That Mysterious
research-lab->mrlhtp_summary Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions. Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions.
research-lab->mrl2_abstract On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation. On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.
downloads->mobilelight3 page to see where we are. page to see where we are.
moneropedia->entries->paperwallet Paper Wallet Paper Wallet
moneropedia->entries->paymentid Payment ID Payment ID
moneropedia->entries->pruning Pruning Pruning
library->zerotomonerov2p Published: April 4, 2020, with <a href="https://github.com/UkoeHB/Monero-RCT-report">LaTeX source code here</a><br> A comprehensive conceptual (and technical) explanation of Monero.<br> We endeavor to teach anyone who knows basic algebra and simple computer science concepts like the ‘bit representation’ of a number not only how Monero works at a deep and comprehensive level, but also how useful and beautiful cryptography can be.
Published: April 4, 2020, with <a href="https://github.com/UkoeHB/Monero-RCT-report">LaTeX source code here</a><br> A comprehensive conceptual (and technical) explanation of Monero.<br> We endeavor to teach anyone who knows basic algebra and simple computer science concepts like the ‘bit representation’ of a number not only how Monero works at a deep and comprehensive level, but also how useful and beautiful cryptography can be.
library->zerotomonerov1p Published: June 26, 2018, with <a href="https://github.com/UkoeHB/Monero-RCT-report">LaTeX source code here</a>
Published: June 26, 2018, with <a href="https://github.com/UkoeHB/Monero-RCT-report">LaTeX source code here</a>
library->revuoq3p Quarterly Monero magazine, Q3 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, community, Hardware, and Monerujo.
Quarterly Monero magazine, Q3 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, community, Hardware, and Monerujo.
library->revuoq4p Quarterly Monero magazine, Q4 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, and community.
Quarterly Monero magazine, Q4 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, and community.
moneropedia->entries->randomx RandomX RandomX
research-lab->mrl3_abstract Recently, there have been some vague fears about the CryptoNote source code and protocol floating around the internet based on the fact that it is a more complicated protocol than, for instance, Bitcoin. The purpose of this note is to try and clear up some misconceptions, and hopefully remove some of the mystery surrounding Monero Ring Signatures. I will start by comparing the mathematics involved in CryptoNote ring signatures (as described in [CN]) to the mathematics in [FS], on which CryptoNote is based. After this, I will compare the mathematics of the ring signature to what is actually in the CryptoNote codebase. Recently, there have been some vague fears about the CryptoNote source code and protocol floating around the internet based on the fact that it is a more complicated protocol than, for instance, Bitcoin. The purpose of this note is to try and clear up some misconceptions, and hopefully remove some of the mystery surrounding Monero Ring Signatures. I will start by comparing the mathematics involved in CryptoNote ring signatures (as described in [CN]) to the mathematics in [FS], on which CryptoNote is based. After this, I will compare the mathematics of the ring signature to what is actually in the CryptoNote codebase.
moneropedia->entries->remote-node Remote Node Remote Node