SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies
From MaRDI portal
Publication:2670873
DOI10.1007/978-3-662-63958-0_38zbMath1490.94053OpenAlexW3127359013MaRDI QIDQ2670873
Alexei Zamyatin, Aljosha Judmayer, Peter Gaži, Itay Tsabary, Sarah Meiklejohn, Edgar Weippl, Nicholas Stifter, Ittay Eyal
Publication date: 1 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-63958-0_38
Cites Work
- Unnamed Item
- But why does it work? A rational protocol design treatment of bitcoin
- The Bitcoin backbone protocol with chains of variable difficulty
- Bitcoin as a transaction ledger: a composable treatment
- Order-fairness for Byzantine consensus
- The Bitcoin Backbone Protocol: Analysis and Applications
- Majority Is Not Enough: Bitcoin Mining Is Vulnerable
- Atomic Cross-Chain Swaps
- Analysis of the Blockchain Protocol in Asynchronous Networks
This page was built for publication: SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies