共 51 条
[3]
[Anonymous], 2013, Financial Cryptography and Data Security, DOI [DOI 10.1007/978-3-642-39884-14, DOI 10.1007/978-3-642-39884-1]
[4]
Back A., 2002, Hashcash-a denial of service counter-measure
[5]
Contextualizing Consensus Protocols in Blockchain: A Short Survey
[J].
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019),
2019,
:190-195
[6]
Begicheva A., 2018, FAIR PROOF STAKE TEC
[7]
Bellini E., 2019, P 3 INT C NUMERICAL, VVolume 11973, P343, DOI [10.1007/978-3-030-39081-5_30, DOI 10.1007/978-3-030-39081-5_30]
[8]
Brown D.R.L., 2010, Standards for efficient cryptography sec 2: recommended elliptic curve domain parameters
[9]
Bulletproofs: Short Proofs for Confidential Transactions and More
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:315-334
[10]
Combinatorics on n-sets: Arithmetic Properties and Numerical Results
[J].
NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS, PT I,
2020, 11973
:389-401