Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
暂无分享,去创建一个
Elaine Shi | Andrew Miller | Ahmed E. Kosba | Kevin Delmolino | Mitchell Arnett | E. Shi | Andrew K. Miller | A. Kosba | Kevin Delmolino | Mitchell Arnett
[1] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[2] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[3] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[4] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[5] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[6] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[7] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[8] Aviv Zohar,et al. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..
[9] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, IEEE Symposium on Security and Privacy.
[10] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[11] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[12] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] Aniket Kate,et al. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.
[14] Abhi Shelat,et al. Micropayments for Decentralized Currencies , 2015, IACR Cryptol. ePrint Arch..
[15] Elaine Shi,et al. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.
[16] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).