@@ -111,7 +111,7 @@ There are now several Layer 2 protocols that scale Ethereum using different tech
111
111
#### Recent research {#recent-research-2}
112
112
113
113
- [ Arbitrum's fair-ordering for sequencers] ( https://eprint.iacr.org/2021/1465 )
114
- - [ ethresear .ch Layer 2] ( https://ethresear.ch/c/layer-2/32 )
114
+ - [ Ethresear .ch Layer 2] ( https://ethresear.ch/c/layer-2/32 )
115
115
- [ Rollup-centric roadmap] ( https://ethereum-magicians.org/t/a-rollup-centric-ethereum-roadmap/4698 )
116
116
- [ L2Beat] ( https://l2beat.com/ )
117
117
@@ -189,7 +189,7 @@ Ethereum wallets can be browser extensions, desktop and mobile apps or smart con
189
189
190
190
- [ Introduction to wallets] ( /wallets/ )
191
191
- [ Introduction to wallet security] ( /security/ )
192
- - [ ethresear .ch Security] ( https://ethresear.ch/tag/security )
192
+ - [ Ethresear .ch Security] ( https://ethresear.ch/tag/security )
193
193
- [ EIP-2938 Account Abstraction] ( https://eips.ethereum.org/EIPS/eip-2938 )
194
194
- [ EIP-4337 Account Abstraction] ( https://eips.ethereum.org/EIPS/eip-4337 )
195
195
@@ -364,7 +364,7 @@ Oracles import off-chain data onto the blockchain in a permissionless and decent
364
364
365
365
- [ Introduction to Oracles] ( /developers/docs/oracles/ )
366
366
367
- #### Recent Research {#recent-research-18}
367
+ #### Recent research {#recent-research-18}
368
368
369
369
- [ Survey of blockchain oracles] ( https://arxiv.org/pdf/2004.07140.pdf )
370
370
- [ Chainlink white paper] ( https://chain.link/whitepaper )
@@ -381,7 +381,7 @@ Hacks on Ethereum generally exploit vulnerabilities in individual applications r
381
381
382
382
#### Recent research {#recent-research-19}
383
383
384
- - [ ethresear .ch Applications] ( https://ethresear.ch/c/applications/18 )
384
+ - [ Ethresear .ch Applications] ( https://ethresear.ch/c/applications/18 )
385
385
386
386
### Technology stack {#technology-stack}
387
387
0 commit comments