Proofs of Work for Blockchain Protocols
暂无分享,去创建一个
[1] Tanja Lange,et al. Non-uniform cracks in the concrete: the power of free precomputation , 2012, IACR Cryptol. ePrint Arch..
[2] A. Poelstra,et al. On Stake and Consensus , 2015 .
[3] Manoj Prabhakaran,et al. Resource Fairness and Composability of Cryptographic Protocols , 2006, Journal of Cryptology.
[4] Prashant Nalini Vasudevan,et al. Proofs of Useful Work , 2017, IACR Cryptol. ePrint Arch..
[5] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[6] Nir Bitansky,et al. Time-Lock Puzzles from Randomized Encodings , 2016, IACR Cryptol. ePrint Arch..
[7] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[8] Aggelos Kiayias,et al. Indistinguishable Proofs of Work or Knowledge , 2015, ASIACRYPT.
[9] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[10] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[11] Speed-Security Tradeo s in Blockchain Protocols , 2015 .
[12] Aggelos Kiayias,et al. Bootstrapping the Blockchain - Directly , 2016, IACR Cryptol. ePrint Arch..
[13] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[14] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[15] Aggelos Kiayias,et al. Resource-based corruptions and the combinatorics of hidden diversity , 2013, ITCS '13.
[16] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[17] Adam Back,et al. Hashcash - Amortizable Publicly Auditable Cost-Functions , 2002 .
[18] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[19] Elaine Shi,et al. Pseudonymous Secure Computation from Time-Lock Puzzles , 2014, IACR Cryptol. ePrint Arch..
[20] Marcin Andrychowicz,et al. Distributed Cryptography Based on the Proofs of Work , 2014, IACR Cryptol. ePrint Arch..
[21] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[22] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[23] Mihir Bellare,et al. Hash-Function Based PRFs: AMAC and Its Multi-User Security , 2016, EUROCRYPT.
[24] Ari Juels,et al. $evwu Dfw , 1998 .
[25] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[26] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.