A brief survey of Cryptocurrency systems
暂无分享,去创建一个
Anthony Skjellum | Richard R. Brooks | Lu Yu | Oluwakemi Hambolu | Jon Oakley | Ujan Mukhopadhyay | A. Skjellum | R. Brooks | Lu Yu | Jon Oakley | Ujan Mukhopadhyay | Oluwakemi Hambolu
[1] D. Chaum. David Chaum on Electronic Commerce How much do you trust Big Brother? , 1997, IEEE Internet Computing.
[2] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[5] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[6] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[7] Thomas R. Eisenmann,et al. PayPal Merchant Services , 2006 .
[8] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[9] E. Biham,et al. The SHAvite-3 Hash Function , 2008 .
[10] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[11] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[12] Steffen Reith,et al. On Optimized FPGA Implementations of the SHA-3 Candidate Groestl , 2009, IACR Cryptol. ePrint Arch..
[13] Hongjun Wu,et al. The Hash Function JH , 2009 .
[14] Martin Feldhofer,et al. High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein , 2009, IACR Cryptol. ePrint Arch..
[15] Martin Schläffer. Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function , 2010, Selected Areas in Cryptography.
[16] Mohamed El-Hadedy,et al. Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[17] Tecnica,et al. Application-specific Integrated Circuit , 2010 .
[18] W. Jack,et al. Mobile Money: The Economics of M-Pesa , 2011 .
[19] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[20] Samuel Neves,et al. BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.
[21] William J. Luther. Cryptocurrencies, Network Effects, and Switching Costs , 2013 .
[22] David Kuo Chuen Lee. The Cryptocurrency Revolution and its Impact , 2014 .
[23] Nicolas Courtois,et al. Optimizing SHA256 in Bitcoin Mining , 2014, CSS.
[24] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[25] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[26] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[27] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[28] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[29] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[30] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[31] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[32] Ryan Farell,et al. An Analysis of the Cryptocurrency Industry , 2015 .
[33] Simon Josefsson,et al. The scrypt Password-Based Key Derivation Function , 2016, RFC.
[34] Sanjay Jain,et al. When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.
[35] William J. Luther. Cryptocurrencies, Network Effects, and Switching Costs , 2016 .
[36] Oliver Hinz,et al. Blockchain , 2020, Bus. Inf. Syst. Eng..
[37] H. Sherman,et al. Principles of Macroeconomics , 2018 .