[图书][B] Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms

A Judmayer, N Stifter, K Krombholz, E Weippl - 2017 - books.google.com
The new field of cryptographic currencies and consensus ledgers, commonly referred to as
blockchains, is receiving increasing interest from various different communities. These …

Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions

A Miller, A Kosba, J Katz, E Shi - Proceedings of the 22Nd acm sigsac …, 2015 - dl.acm.org
An implicit goal of Bitcoin's reward structure is to diffuse network influence over a diverse,
decentralized population of individual participants. Indeed, Bitcoin's security claims rely on …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

CommitCoin: Carbon Dating Commitments with Bitcoin: (Short Paper)

J Clark, A Essex - International conference on financial cryptography and …, 2012 - Springer
In the standard definition of a commitment scheme, the sender commits to a message and
immediately sends the commitment to the recipient interested in it. However the sender may …

Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols

D Stebila, L Kuppusamy, J Rangasamy, C Boyd… - Topics in Cryptology–CT …, 2011 - Springer
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by
requiring a client to solve some moderately hard problem before being granted access to a …

Evaluation of DNA markers for molecular identification of three Piper species from Brazilian Atlantic Rainforest

APM Egydio Brandao, LF Yamaguchi, EJ Tepe… - PLoS …, 2020 - journals.plos.org
Piper is one of two large genera in the Piperaceae, and with ca. 2600 species, is one of the
largest plant genera in the world. Species delimitation and evaluation of genetic diversity …

Low-cost client puzzles based on modular exponentiation

GO Karame, S Čapkun - European Symposium on Research in Computer …, 2010 - Springer
Client puzzles have been proposed as a useful mechanism for mitigating Denial of Service
attacks on network protocols. While several puzzles have been proposed in recent years …

Moderately hard functions: Definition, instantiations, and applications

J Alwen, B Tackmann - … Conference, TCC 2017, Baltimore, MD, USA …, 2017 - Springer
Several cryptographic schemes and applications are based on functions that are both
reasonably efficient to compute and moderately hard to invert, including client puzzles for …

A method to secure iot devices against botnet attacks

T Shah, S Venkatesan - Internet of Things–ICIOT 2019: 4th International …, 2019 - Springer
An unsecured or weak authentication system between an IoT device and a user provides
opportunities to attackers to manipulate and use the IoT device as botnet. The proliferation of …

The superlinearity problem in post-quantum blockchains

S Park, N Spooner - … Conference on Financial Cryptography and Data …, 2023 - Springer
The proof of work mechanism by which many blockchain-based protocols achieve
consensus may be undermined by the use of quantum computing in mining—even when all …