Chris Pollett > Students > Chen

    Print View




    [Bitcoin Slides-PDF]

    [Bitcoin Mining-PDF]

    [Deliverable 2]

    [Combine Deliverable 2,3]

    [Combine Deliverable 2,3,4]

    [CS297 Report PDF]

    [CS298 proposal]

    [CS298_Presentation PDF]

    [CS298_Report PDF]

    [CS298 source code zip file]


CS297 Proposal

MP3 Base currency system

Timothy Chen (

Advisor: Dr. Chris Pollett


In the last year crypto-currencies such as Bitcon have become popular. This project proposes a new crypto-currency system which allows music artists to upload their music in MP3 format to the website that I implement and earn the currency I have create. The currency amount depends on how long the website users listening to the music. The technology which I am going to use are JavaScript for the front end of website, Php for the back end of website, One way function to do the hash encryption for currency coin.


Week 1: Jan. 27 to Feb. 4Finish the Proposal
Week 2: Feb. 4-11 Read BitCoin paper Bitcoin: A Peer-to-Peer Electronic Cash System
Week 3: Feb. 11-18Finish read BitCoin paper and install BitCoin wallet
Week 4,5,6: Feb. 18 to March 4Finish implement simple hash function work in new currency
Week 7 to 10: March 18 to Apr. 1Finish implement tiger hash and Spring break
Week 11,12,13: Apr. 8-29Finish implement function computer hash while audio playing
Week 14: Apr. 29 to May 6Working on 297 report
Week 15: May 6-13Study for final
Week 16: May 13-20 Finish 297 report


The full project will be done when CS298 is completed. The following will be done by the end of CS297:

1. Read BitCoin paper and install BitCoin wallet

2. Use JavaScript to implement a hash function work in new currency

3. Use JavaScript to implement Tiger hash

4. Use JavaScript to implement function to compute hashes while audio playing

5. A ten page writer report on the progress made in CS297


Satoshi Nakamoto (2009), Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from

Florian Mendel and Vincent Rijmen, Cryptanalysis of the Tiger Hash Function. Retrieved from

SHA-256 Cryptographic Hash Algorithm. Retrieved from

Applied Cryptography Second edition, Bruce Schneier 1996

Jeremy Shulman and Jabari, JordanTiger Hash Algorithm. Retrieved from

Eric Christopher Seidel(November 18, 2003), Tiger Hash Algorithm. Retrieved from