On Bitcoin cash's target recalculation functions
暂无分享,去创建一个
[1] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[2] William J. Knottenbelt,et al. Unstable Throughput: When the Difficulty Algorithm Breaks , 2020, 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[3] Sam Toueg,et al. A Modular Approach to Fault-Tolerant Broadcasts and Related Problems , 1994 .
[4] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[5] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[6] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[7] Aggelos Kiayias,et al. Speed-Security Tradeoffs in Blockchain Protocols , 2015, IACR Cryptol. ePrint Arch..
[8] M. Habib. Probabilistic methods for algorithmic discrete mathematics , 1998 .
[9] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[10] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[11] G. S. Watson,et al. SERIAL CORRELATION IN REGRESSION ANALYSIS. I , 1955 .
[12] C. McDiarmid. Concentration , 1862, The Dental register.
[13] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[14] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[15] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[16] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[17] Aggelos Kiayias,et al. Full Analysis of Nakamoto Consensus in Bounded-Delay Networks , 2020, IACR Cryptol. ePrint Arch..
[18] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.