共 34 条
[1]
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:375-392
[2]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[3]
Buterin V., 2017, arXiv
[4]
Buterin V, 2020, Arxiv, DOI arXiv:2003.03052
[5]
Buterin Vitalik, 2014, Long-range attacks: The serious problem with adaptive proof of work
[6]
Carter N., 2010, Harvard Business Review
[7]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[8]
Chan B.Y., 2020, AFT 20 2 ACM C ADV F, P1, DOI [10.1145/3419614.3423256, DOI 10.1145/3419614.3423256]
[9]
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019,
2019, 11598
:23-41
[10]
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II,
2018, 10821
:66-98