共 24 条
[1]
Back A., 1997, Hashcash
[2]
Bahack L., 2013, IACR Cryptol ePrint Arch., V2013, P868
[3]
Bellare Mihir, 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
[4]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[6]
Canetti R., 2000, IACR Cryptology ePrint Archive, V2000, P67
[7]
Dwork C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P139
[9]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[10]
GARAY JA, 2014, IACR CRYPTOLOGY EPRI, V2014, P765