Inner For-Loop for Speeding Up Blockchain Mining
暂无分享,去创建一个
[1] W. Bolt. Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction , 2017 .
[2] Z. Beheshti. A review of population-based meta-heuristic algorithm , 2013, SOCO 2013.
[3] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[4] Luca Weisz. Schaums Outline Of Theory And Problems Of Business Statistics , 2016 .
[5] Maurice Clerc,et al. From Theory to Practice in Particle Swarm Optimization , 2011 .
[6] Alex Biryukov,et al. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem , 2016, NDSS.
[7] Dan Boneh,et al. On genetic algorithms , 1995, COLT '95.
[8] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[9] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[10] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[11] Alex Biryukov,et al. Asymmetric proof-of-work based on the Generalized Birthday problem , 2017, IACR Cryptol. ePrint Arch..
[12] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.
[13] Per Kristian Lehre,et al. Finite First Hitting Time versus Stochastic Convergence in Particle Swarm Optimisation , 2011, ArXiv.
[14] Danilo Gligoroski,et al. SoK of Used Cryptography in Blockchain , 2019, IEEE Access.
[15] Piotr Szwed,et al. Formal Analysis of Use Case Diagrams , 2010, Comput. Sci..
[16] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[17] Tosin P. Adewumi. Inner loop program construct: A faster way for program execution , 2018, Open Comput. Sci..
[18] C H Swaroop,et al. A Byte of Python , 2013 .
[19] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[20] Pavel S. Fedotov,et al. ASIC-resistant hash functions , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[21] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[22] Ye Er-lan,et al. The Introduction of Particle Swarm Optimization , 2010 .
[23] H Lee Willis,et al. Power distribution planning reference book , 2000 .
[24] Goldberg,et al. Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.