Merged Mining: Curse or Cure?
暂无分享,去创建一个
Edgar R. Weippl | Artemios G. Voyiatzis | Aljosha Judmayer | Alexei Zamyatin | Nicholas Stifter | Aljosha Judmayer | Nicholas Stifter | Alexei Zamyatin | E. Weippl | A. Voyiatzis
[1] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[2] A. Juels,et al. PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) , 1999 .
[3] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[4] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[5] Michael Bedford Taylor,et al. Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[6] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[7] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[8] Pedro Franco,et al. Understanding Bitcoin: Cryptography, Engineering and Economics , 2014 .
[9] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[10] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[11] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[12] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[13] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[14] Bruce M. Kapron,et al. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..
[15] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[16] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[17] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[18] Muneeb Ali,et al. Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.
[19] Ingo Weber,et al. New kids on the block: an analysis of modern blockchains , 2016, ArXiv.
[20] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[21] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[22] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[23] Silvio Micali,et al. ALGORAND: The Efficient and Democratic Ledger , 2016, ArXiv.
[24] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[25] Elaine Shi,et al. Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..
[26] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[27] R. Pass. Hybrid Consensus : Scalable Permissionless Consensus , 2016 .
[28] W. Bolt. Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction , 2017 .