You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: bip-0098.mediawiki
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -176,7 +176,7 @@ In tabular form, these code values are:
176
176
|}
177
177
178
178
These 3-bit codes are packed into a byte array such that eight (8) codes would fit in every three (3) bytes.
179
-
The order of filling a byte begins with the most significant bit <code>0x80</code> and ends with the lest significant bit <code>0x01</code>.
179
+
The order of filling a byte begins with the most significant bit <code>0x80</code> and ends with the least significant bit <code>0x01</code>.
180
180
Unless the number of inner nodes is a multiple of eight (8), there will be excess low-order bits in the final byte of serialization.
181
181
These excess bits must be zero.
182
182
@@ -244,7 +244,7 @@ and is exactly equal to the number of inner nodes serialized as the beginning of
244
244
The variable-length integer encoding has the property that serialized integers, sorted lexigraphically, will also be sorted numerically.
245
245
Since the first serialized item is the number of inner nodes, sorting proofs lexigraphically has the effect of sorting the proofs by the amount of work required to verify.
246
246
247
-
The number of hashes required as input for verification of a proof is N+1 minus the number of SKIP hashses,
247
+
The number of hashes required as input for verification of a proof is N+1 minus the number of SKIP hashes,
248
248
and can be quickly calculated without parsing the tree structure.
249
249
250
250
The coding and packing rules for the serialized tree structure were also chosen to make lexigraphical comparison useful (or at least not meaningless).
@@ -264,7 +264,7 @@ which has the additional benefit of enabling log-space verification algorithms.
264
264
==Fast Merkle Lists==
265
265
266
266
Many applications use a Merkle tree to provide indexing of, or compact membership proofs about the elements in a list.
267
-
This ammendum specifies an algorithm that constructs a canonical balanced tree structure for lists of various lengths.
267
+
This addendum specifies an algorithm that constructs a canonical balanced tree structure for lists of various lengths.
268
268
It differs in a subtle but important way from the algorithm used by Satoshi so as to structurally prevent the vulnerability described in [1].
0 commit comments