Student Presentations

Choose your 5-minute presentation topic. Each student presents once during the semester on a topic of their choice.

60
Topics Available
0
Topics Claimed
5
Minutes Each

How to Sign Up

Click "Claim This Topic" on any available topic. This opens a GitHub Issue where you enter your name and email. First come, first served!

Open Signup Form

Presentation Guidelines

5-Minute Structure

  • 0:00-0:30Hook & Introduction
  • 0:30-1:30Background/Context
  • 1:30-3:30Main Content
  • 3:30-4:30Real-World Impact
  • 4:30-5:00Key Takeaway

Grading (20 Points)

  • Content Accuracy5 pts
  • Clarity of Explanation5 pts
  • Visual Aids Quality4 pts
  • Time Management3 pts
  • Engagement/Delivery3 pts

Submission

  • FormatPDF slides
  • Upload toMoodle
  • Deadline1 day before
  • Slides5-8 recommended
  • LanguageEnglish or German
#1 Available
Theory & Foundations

Byzantine Fault Tolerance Explained

Explain the Byzantine Generals Problem and how BFT consensus algorithms solve it. Cover practical applications in blockchain.

#2 Available
Theory & Foundations

Nakamoto Consensus Deep Dive

Analyze Bitcoin's consensus mechanism: longest chain rule, probabilistic finality, and security assumptions.

#3 Available
Theory & Foundations

Proof of Stake vs Proof of Work Economics

Compare the economic incentives, security models, and environmental impact of PoS vs PoW consensus.

#4 Available
Theory & Foundations

Cryptographic Hash Functions in Blockchain

Explain SHA-256 and other hash functions: properties, applications in mining, Merkle trees, and data integrity.

#5 Available
Theory & Foundations

Digital Signatures & Public Key Cryptography

Cover ECDSA, Schnorr signatures, and how public key cryptography enables trustless ownership.

#6 Available
Theory & Foundations

Merkle Trees & Data Integrity

Explain Merkle trees, SPV proofs, and how they enable light clients to verify transactions efficiently.

#7 Available
Theory & Foundations

Game Theory in Blockchain Consensus

Analyze Nash equilibria in mining/staking, selfish mining strategies, and incentive alignment.

#8 Available
Theory & Foundations

The Double-Spending Problem

Explain why double-spending was the core problem Bitcoin solved and how confirmation depth provides security.

#9 Available
Theory & Foundations

Blockchain Trilemma Analysis

Analyze the scalability trilemma: decentralization vs security vs scalability trade-offs across different blockchains.

#10 Available
Theory & Foundations

Nothing-at-Stake Problem in PoS

Explain the nothing-at-stake attack, why it's unique to PoS, and how slashing mechanisms prevent it.

#11 Available
Protocols & Implementations

Bitcoin Lightning Network

Explain payment channels, HTLCs, routing, and how Lightning enables instant Bitcoin payments.

#12 Available
Protocols & Implementations

Ethereum 2.0 Beacon Chain

Explain the Beacon Chain architecture, validator duties, epochs, slots, and Casper FFG finality.

#13 Available
Protocols & Implementations

Solana's Proof of History

Explain Proof of History, Tower BFT, and how Solana achieves high throughput. Discuss trade-offs.

#14 Available
Protocols & Implementations

Cosmos IBC Protocol

Explain Inter-Blockchain Communication, light clients, relayers, and the Cosmos Hub ecosystem.

#15 Available
Protocols & Implementations

Polkadot Parachains

Explain the relay chain, parachains, shared security model, and parachain auctions.

#16 Available
Protocols & Implementations

Avalanche Consensus

Explain Avalanche's novel consensus using repeated sub-sampling and how subnets enable customization.

#17 Available
Protocols & Implementations

Arbitrum vs Optimism Comparison

Compare the two leading optimistic rollups: architecture, fraud proofs, tokenomics, and ecosystem.

#18 Available
Protocols & Implementations

zkSync & ZK-Rollups

Explain zero-knowledge proofs, zkSync's architecture, and why ZK-rollups may be the future of scaling.

#19 Available
Protocols & Implementations

Polygon PoS Architecture

Explain Polygon's architecture, its evolution from Matic, and the various Polygon chains (PoS, zkEVM).

#20 Available
Protocols & Implementations

Base (Coinbase L2)

Explain Base's architecture, relationship to Optimism, and Coinbase's strategy for mainstream adoption.

#21 Available
DeFi Deep Dives

Uniswap V3 Concentrated Liquidity

Explain concentrated liquidity positions, capital efficiency gains, and LP strategy considerations.

#22 Available
DeFi Deep Dives

Aave Flash Loans Mechanics

Explain flash loans, use cases (arbitrage, liquidations, collateral swaps), and risks.

#23 Available
DeFi Deep Dives

MakerDAO & DAI Stability

Explain CDP mechanics, stability fees, liquidations, and how DAI maintains its peg.

#24 Available
DeFi Deep Dives

Curve Finance & Stablecoin AMMs

Explain StableSwap invariant, low slippage for pegged assets, and the Curve Wars.

#25 Available
DeFi Deep Dives

Lido & Liquid Staking

Explain liquid staking derivatives, stETH mechanics, and centralization concerns.

#26 Available
DeFi Deep Dives

Compound Interest Rate Model

Explain utilization-based interest rates, cTokens, and governance token distribution.

#27 Available
DeFi Deep Dives

dYdX Perpetual Futures

Explain perpetual contracts, funding rates, and decentralized derivatives trading.

#28 Available
DeFi Deep Dives

Pendle & Yield Tokenization

Explain yield tokenization, PT/YT tokens, and fixed-rate yield strategies.

#29 Available
DeFi Deep Dives

EigenLayer Restaking

Explain restaking, actively validated services (AVS), and shared security implications.

#30 Available
DeFi Deep Dives

Morpho Lending Optimization

Explain peer-to-peer lending optimization, rate improvement, and Morpho Blue architecture.

#31 Available
NFTs & Digital Assets

BAYC & PFP Culture Analysis

Analyze Bored Ape Yacht Club's success, community building, and the PFP NFT phenomenon.

#32 Available
NFTs & Digital Assets

Art Blocks & Generative Art

Explain generative art NFTs, on-chain art, and notable Art Blocks collections (Fidenza, Chromie Squiggle).

#33 Available
NFTs & Digital Assets

OpenSea vs Blur Market Dynamics

Compare marketplace strategies, fee structures, royalty policies, and the aggregator wars.

#34 Available
NFTs & Digital Assets

NFT Royalty Enforcement Problem

Explain the royalty bypass problem, on-chain vs off-chain enforcement, and creator economics.

#35 Available
NFTs & Digital Assets

Ordinals & Bitcoin NFTs

Explain Bitcoin Ordinals, inscriptions, BRC-20 tokens, and the debate around Bitcoin block space.

#36 Available
NFTs & Digital Assets

Soulbound Tokens (SBTs)

Explain non-transferable tokens for identity, credentials, reputation, and Vitalik's vision.

#37 Available
NFTs & Digital Assets

Dynamic NFTs

Explain NFTs that change based on external data, oracles, and interactive art experiences.

#38 Available
NFTs & Digital Assets

Music NFTs & Artist Royalties

Explore music NFT platforms, streaming royalty tokenization, and artist-fan relationships.

#39 Available
NFTs & Digital Assets

Gaming NFTs Economy (Axie, Gods Unchained)

Analyze play-to-earn economics, in-game asset ownership, and sustainability challenges.

#40 Available
NFTs & Digital Assets

RWA Tokenization (BlackRock BUIDL)

Explain real-world asset tokenization, BlackRock's BUIDL fund, and institutional adoption.

#41 Available
Security & Incidents

The DAO Hack (2016)

Analyze the DAO hack, reentrancy vulnerability, Ethereum hard fork decision, and lessons learned.

#42 Available
Security & Incidents

Terra/Luna Collapse Analysis

Deep dive into the death spiral mechanics, Anchor's role, and systemic risk lessons.

#43 Available
Security & Incidents

FTX Fraud & Lessons

Analyze the FTX collapse, Alameda relationship, lack of controls, and regulatory implications.

#44 Available
Security & Incidents

Ronin Bridge Hack

Analyze the $620M Ronin bridge hack, validator key compromise, and bridge security lessons.

#45 Available
Security & Incidents

Wormhole Exploit

Analyze the $320M Wormhole exploit, signature verification bug, and cross-chain bridge risks.

#46 Available
Security & Incidents

Reentrancy Attack Patterns

Explain reentrancy vulnerabilities, checks-effects-interactions pattern, and prevention techniques.

#47 Available
Security & Incidents

Flash Loan Attack Vectors

Analyze flash loan attacks: oracle manipulation, governance attacks, arbitrage exploits.

#48 Available
Security & Incidents

MEV & Sandwich Attacks

Explain MEV extraction, sandwich attacks, Flashbots, and MEV mitigation strategies.

#49 Available
Security & Incidents

Smart Contract Audit Process

Explain the audit lifecycle, common findings, audit firms, and what makes a good audit.

#50 Available
Security & Incidents

Bug Bounty Programs in Crypto

Analyze bug bounty economics, Immunefi, notable payouts, and responsible disclosure.

#51 Available
Regulation & Business

SEC vs Ripple Case

Analyze the landmark case, Howey Test application, and implications for crypto regulation.

#52 Available
Regulation & Business

EU MiCA Regulation

Explain MiCA framework, CASP requirements, stablecoin rules, and implementation timeline.

#53 Available
Regulation & Business

Swiss FINMA Framework

Explain Switzerland's crypto-friendly approach, token classification, and Crypto Valley.

#54 Available
Regulation & Business

US Bitcoin ETF Impact

Analyze spot Bitcoin ETF approval, inflows, impact on price, and institutional adoption.

#55 Available
Regulation & Business

CBDC Designs Comparison

Compare CBDC approaches: China's e-CNY, Digital Euro, privacy considerations.

#56 Available
Regulation & Business

Crypto Taxation Strategies

Explain FIFO/LIFO, DeFi tax events, reporting requirements, and tax-loss harvesting.

#57 Available
Regulation & Business

Stablecoin Regulation (USDC, USDT)

Compare regulatory approaches to stablecoins, reserve requirements, and transparency.

#58 Available
Regulation & Business

KYC/AML in DeFi

Explore the tension between DeFi's permissionless nature and regulatory KYC/AML requirements.

#59 Available
Regulation & Business

DAO Legal Structures

Explore DAO legal wrappers, Wyoming DAO LLC, liability, and governance challenges.

#60 Available
Regulation & Business

Crypto Exchange Business Models

Analyze CEX vs DEX revenue models, trading fees, listing fees, and competitive dynamics.

# Title Category Status Action