
downloads>cli_helpsupport

If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monerodev, or else check out the Hangouts page for a more complete list of contacts and chatrooms

If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monerodev, or else check out the Hangouts page for a more complete list of contacts and chatrooms


researchlab>mrl4

Improving Obfuscation in the CryptoNote Protocol

Improving Obfuscation in the CryptoNote Protocol


moneropedia>entries>locallyuniquehost

Locallyunique host

Locallyunique host


presskit>marketing

Marketing Material

Marketing Material


moneropedia>entries>mining

Mining

Mining


moneropedia>entries>mnemonicseed

Mnemonic Seed

Mnemonic Seed


researchlab>mrl3

Monero is Not That Mysterious

Monero is Not That Mysterious


researchlab>mrlhtp_summary

Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions.

Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions.


researchlab>mrl2_abstract

On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.

On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.


downloads>mobilelight3

page to see where we are.

page to see where we are.


moneropedia>entries>paperwallet

Paper Wallet

Paper Wallet


moneropedia>entries>paymentid

Payment ID

Payment ID


moneropedia>entries>pruning

Pruning

Pruning


library>zerotomonerov2p

Published: April 4, 2020, with <a href="https://github.com/UkoeHB/MoneroRCTreport">LaTeX source code here</a><br> A comprehensive conceptual (and technical) explanation of Monero.<br> We endeavor to teach anyone who knows basic algebra and simple computer science concepts like the ‘bit representation’ of a number not only how Monero works at a deep and comprehensive level, but also how useful and beautiful cryptography can be.

Published: April 4, 2020, with <a href="https://github.com/UkoeHB/MoneroRCTreport">LaTeX source code here</a><br> A comprehensive conceptual (and technical) explanation of Monero.<br> We endeavor to teach anyone who knows basic algebra and simple computer science concepts like the ‘bit representation’ of a number not only how Monero works at a deep and comprehensive level, but also how useful and beautiful cryptography can be.


library>zerotomonerov1p

Published: June 26, 2018, with <a href="https://github.com/UkoeHB/MoneroRCTreport">LaTeX source code here</a>

Published: June 26, 2018, with <a href="https://github.com/UkoeHB/MoneroRCTreport">LaTeX source code here</a>


library>revuoq3p

Quarterly Monero magazine, Q3 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, community, Hardware, and Monerujo.

Quarterly Monero magazine, Q3 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, community, Hardware, and Monerujo.


library>revuoq4p

Quarterly Monero magazine, Q4 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, and community.

Quarterly Monero magazine, Q4 2017 edition.<br> In this issue, updates about: development, Monero Research Lab, Kovri, and community.


moneropedia>entries>randomx

RandomX

RandomX


researchlab>mrl3_abstract

Recently, there have been some vague fears about the CryptoNote source code and protocol floating around the internet based on the fact that it is a more complicated protocol than, for instance, Bitcoin. The purpose of this note is to try and clear up some misconceptions, and hopefully remove some of the mystery surrounding Monero Ring Signatures. I will start by comparing the mathematics involved in CryptoNote ring signatures (as described in [CN]) to the mathematics in [FS], on which CryptoNote is based. After this, I will compare the mathematics of the ring signature to what is actually in the CryptoNote codebase.

Recently, there have been some vague fears about the CryptoNote source code and protocol floating around the internet based on the fact that it is a more complicated protocol than, for instance, Bitcoin. The purpose of this note is to try and clear up some misconceptions, and hopefully remove some of the mystery surrounding Monero Ring Signatures. I will start by comparing the mathematics involved in CryptoNote ring signatures (as described in [CN]) to the mathematics in [FS], on which CryptoNote is based. After this, I will compare the mathematics of the ring signature to what is actually in the CryptoNote codebase.


moneropedia>entries>remotenode

Remote Node

Remote Node
