Defending Against Malicious Reorgs in Tezos Proof-of-Stake
暂无分享,去创建一个
David C. Parkes | Michael Neuder | Daniel J. Moroz | Rithvik Rao | Daniel J. Moroz | D. Parkes | M. Neuder | Rithvik Rao
[1] Serguei Popov. A Probabilistic Analysis of the Nxt Forging Algorithm , 2016, Ledger.
[2] S. Matthew Weinberg,et al. Formal Barriers to Longest-Chain Proof-of-Stake Protocols , 2018, EC.
[3] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] David C. Parkes,et al. Selfish Behavior in the Tezos Proof-of-Stake Protocol , 2019, ArXiv.
[5] Ying Wang,et al. Combining GHOST and Casper , 2020, ArXiv.
[6] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[7] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[8] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[9] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[10] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[11] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[12] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[13] Vitalik Buterin,et al. Casper the Friendly Finality Gadget , 2017, ArXiv.