-
1
-
-
33845427383
-
Fault-scalable Byzantine Fault-tolerant Services
-
Oct
-
ABD-EL-MALEK, M., GANGER, G. R., GOOD-SON, G. R., REITER, M. K., AND WYLIE, J. J. Fault-scalable Byzantine Fault-tolerant Services. SIGOPS Operating Systems Review 39, 5 (Oct. 2005), 59–74.
-
(2005)
SIGOPS Operating Systems Review
, vol.39
, Issue.5
, pp. 59-74
-
-
Abd-El-Malek, M.1
Ganger, G.R.2
Good-Son, G.R.3
Reiter, M.K.4
Wylie, J.J.5
-
4
-
-
84927645826
-
Proofs of space: When space is of the essence
-
Springer
-
ATENIESE, G., BONACINA, I., FAONIO, A., AND GALESI, N. Proofs of Space: When Space is of the Essence. In Security and Cryptography for Networks. Springer, 2014, pp. 538–557.
-
(2014)
Security and Cryptography for Networks
, pp. 538-557
-
-
Ateniese, G.1
Bonacina, I.2
Faonio, A.3
Galesi, N.4
-
5
-
-
84943593919
-
-
BACK, A., CORALLO, M., DASHJR, L., FRIEDENBACH, M., MAXWELL, G., MILLER, A., POELSTRA, A., TIMÓN, J., AND WUILLE, P. Enabling Blockchain Innovations with Pegged Sidechains.
-
Enabling Blockchain Innovations with Pegged Sidechains
-
-
Back, A.1
Corallo, M.2
Dashjr, L.3
Friedenbach, M.4
Maxwell, G.5
Miller, A.6
Poelstra, A.7
Timón, J.8
Wuille, P.9
-
6
-
-
84884478474
-
High-speed high-security signatures
-
BERNSTEIN, D. J., DUIF, N., LANGE, T., SCHWABE, P., AND YANG, B.-Y. High-speed high-security signatures. Journal of Cryptographic Engineering 2, 2 (2012), 77–89.
-
(2012)
Journal of Cryptographic Engineering
, vol.2
, Issue.2
, pp. 77-89
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.-Y.5
-
7
-
-
85080628886
-
-
BITCOIN WIKI. Confirmation, 2016.
-
(2016)
Confirmation
-
-
-
8
-
-
85031035060
-
-
BITCOIN WIKI. Scalability, 2016.
-
(2016)
Scalability
-
-
-
9
-
-
84945176880
-
Research perspectives and challenges for bitcoin and cryptocurrencies
-
BONNEAU, J., MILLER, A., CLARK, J., NARAYANAN, A., KROLL, J., AND FELTEN, E. W. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy. IEEE (2015).
-
(2015)
2015 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.5
Felten, E.W.6
-
11
-
-
0004149985
-
Secure and efficient asynchronous broadcast protocols
-
Aug
-
CACHIN, C., KURSAWE, K., PETZOLD, F., AND SHOUP, V. Secure and Efficient Asynchronous Broadcast Protocols. In Advances in Cryptology (CRYPTO) (Aug. 2001).
-
(2001)
Advances in Cryptology (CRYPTO)
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
13
-
-
21644470909
-
SplitStream: High-bandwidth multicast in cooperative environments
-
CASTRO, M., DRUSCHEL, P., KERMARREC, A.M., NANDI, A., ROWSTRON, A., AND SINGH, A. SplitStream: high-bandwidth multicast in cooperative environments. In ACM Symposium on Operating Systems Principles (SOSP) (2003).
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.M.3
Nandi, A.4
Rowstron, A.5
Singh, A.6
-
15
-
-
85026654819
-
Making Byzantine fault tolerant systems tolerate byzantine faults
-
Apr
-
CLEMENT, A., WONG, E. L., ALVISI, L., DAHLIN, M., AND MARCHETTI, M. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. In 6th USENIX Symposium on Networked Systems Design and Implementation (Apr. 2009).
-
(2009)
6th USENIX Symposium on Networked Systems Design and Implementation
-
-
Clement, A.1
Wong, E.L.2
Alvisi, L.3
Dahlin, M.4
Marchetti, M.5
-
16
-
-
85009705400
-
HQ replication: A hybrid quorum protocol for Byzantine fault tolerance
-
Berkeley, CA, USA, OSDI’06, USENIX Association
-
COWLING, J., MYERS, D., LISKOV, B., RODRIGUES, R., AND SHRIRA, L. HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. In 7th Symposium on Operating Systems Design and Implementation (Berkeley, CA, USA, 2006), OSDI’06, USENIX Association, pp. 177–190.
-
(2006)
7th Symposium on Operating Systems Design and Implementation
, pp. 177-190
-
-
Cowling, J.1
Myers, D.2
Liskov, B.3
Rodrigues, R.4
Shrira, L.5
-
17
-
-
84978291536
-
On scaling decentralized blockchains (a position paper)
-
CROMAN, K., DECKE, C., EYAL, I., GENCER, A. E., JUELS, A., KOSBA, A., MILLER, A., SAXENA, P., SHI, E., SIRER, E. G., AN, D. S., AND WATTENHOFER, R. On Scaling Decentralized Blockchains (A Position Paper). In 3rd Workshop on Bitcoin and Blockchain Research (2016).
-
(2016)
3rd Workshop on Bitcoin and Blockchain Research
-
-
Croman, K.1
Decke, C.2
Eyal, I.3
Gencer, A.E.4
Juels, A.5
Kosba, A.6
Miller, A.7
Saxena, P.8
Shi, E.9
Sirer, E.G.10
An, D.S.11
Wattenhofer, R.12
-
20
-
-
84943598717
-
A fast and scalable payment network with bitcoin duplex micropayment channels
-
Springer, Aug
-
DECKER, C., AND WATTENHOFER, R. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In Stabilization, Safety, and Security of Distributed Systems. Springer, Aug. 2015, pp. 3–18.
-
(2015)
Stabilization, Safety, and Security of Distributed Systems
, pp. 3-18
-
-
Decker, C.1
Wattenhofer, R.2
-
24
-
-
85071147013
-
Bitcoin-NG: A scalable blockchain protocol
-
Santa Clara, CA, Mar. USENIX Association
-
EYAL, I., GENCER, A. E., SIRER, E. G., AND VAN RENESSE, R. Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) (Santa Clara, CA, Mar. 2016), USENIX Association.
-
(2016)
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)
-
-
Eyal, I.1
Gencer, A.E.2
Sirer, E.G.3
Van Renesse, R.4
-
25
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer
-
EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
-
(2014)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.G.2
-
27
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
FISCHER, M. J., LYNCH, N. A., AND PATERSON, M. S. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM) 32, 2 (1985), 374–382.
-
(1985)
Journal of the ACM (JACM)
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
29
-
-
84942589265
-
The Bitcoin backbone protocol: Analysis and applications
-
Springer
-
GARAY, J., KIAYIAS, A., AND LEONARDOS, N. The Bitcoin backbone protocol: Analysis and applications. In EUROCRYPT 2015. Springer, 2015, pp. 281–310.
-
(2015)
EUROCRYPT 2015
, pp. 281-310
-
-
Garay, J.1
Kiayias, A.2
Leonardos, N.3
-
30
-
-
85028302006
-
-
Tech. rep., IACR: Cryptology ePrint Archive
-
GERVAIS, A., KARAME, G. O., WUST, K., GLYKANTZIS, V., RITZDORF, H., AND CAPKUN, S. On the Security and Performance of Proof of Work Blockchains. Tech. rep., IACR: Cryptology ePrint Archive, 2016.
-
(2016)
On the Security and Performance of Proof of Work Blockchains
-
-
Gervais, A.1
Karame, G.O.2
Wust, K.3
Glykantzis, V.4
Ritzdorf, H.5
Capkun, S.6
-
31
-
-
84954139059
-
Tampering with the delivery of blocks and transactions in bitcoin
-
GERVAIS, A., RITZDORF, H., KARAME, G. O., AND CAPKUN, S. Tampering with the Delivery of Blocks and Transactions in Bitcoin. In 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 692–705.
-
(2015)
22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 692-705
-
-
Gervais, A.1
Ritzdorf, H.2
Karame, G.O.3
Capkun, S.4
-
32
-
-
77954599278
-
The next 700 BFT protocols
-
GUERRAOUI, R., KNEŽEVIĆ, N., QUÉMA, V., AND VUKOLIĆ, M. The next 700 BFT protocols. In 5th European conference on Computer systems (2010), ACM, pp. 363–376.
-
(2010)
5th European Conference on Computer Systems
, pp. 363-376
-
-
Guerraoui, R.1
Knežević, N.2
Quéma, V.3
Vukolić, M.4
-
34
-
-
85070733097
-
Eclipse attacks on Bitcoin’s peer-to-peer network
-
HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S. Eclipse Attacks on Bitcoin’s Peer-to-Peer Network. In 24th USENIX Security Symposium (2015), pp. 129–144.
-
(2015)
24th USENIX Security Symposium
, pp. 129-144
-
-
Heilman, E.1
Kendler, A.2
Zohar, A.3
Goldberg, S.4
-
35
-
-
84869455769
-
Double-spending fast payments in Bitcoin
-
KARAME, G. O., ANDROULAKI, E., AND CAPKUN, S. Double-spending fast payments in Bitcoin. In 19th ACM Conference on Computer and communications security (2012), ACM, pp. 906–917.
-
(2012)
19th ACM Conference on Computer and Communications Security
, pp. 906-917
-
-
Karame, G.O.1
Androulaki, E.2
Capkun, S.3
-
38
-
-
70450015331
-
ZyzzyVa: Speculative Byzantine fault tolerance
-
Oct. ACM
-
KOTLA, R., ALVISI, L., DAHLIN, M., CLEMENT, A., AND WONG, E. Zyzzyva: Speculative Byzantine Fault Tolerance. In 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (Oct. 2007), ACM.
-
(2007)
21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP)
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
39
-
-
84976699318
-
The Byzantine generals problem
-
LAMPORT, L., SHOSTAK, R., AND PEASE, M. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (1982), 382–401.
-
(1982)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
40
-
-
84945975352
-
A random zoo: Sloth, unicorn, and trx
-
Apr
-
LENSTRA, A. K., AND WESOLOWSKI, B. A random zoo: sloth, unicorn, and trx. IACR eprint archive, Apr. 2015.
-
(2015)
IACR Eprint Archive
-
-
Lenstra, A.K.1
Wesolowski, B.2
-
41
-
-
84949947631
-
Inclusive block chain protocols
-
Springer, Jan
-
LEWENBERG, Y., SOMPOLINSKY, Y., AND ZOHAR, A. Inclusive Block Chain Protocols. In Financial Cryptography and Data Security. Springer, Jan. 2015, pp. 528–547.
-
(2015)
Financial Cryptography and Data Security
, pp. 528-547
-
-
Lewenberg, Y.1
Sompolinsky, Y.2
Zohar, A.3
-
44
-
-
0003455038
-
-
PhD thesis, Stanford University, June
-
MERKLE, R. C. Secrecy, Authentication, and Public Key Systems. PhD thesis, Stanford University, June 1979.
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.C.1
-
46
-
-
84966585262
-
The honey badger of BFT protocols
-
MILLER, A., XIA, Y., CROMAN, K., SHI, E., AND SONG, D. The honey badger of BFT protocols. Tech. rep., Cryptology ePrint Archive 2016/199, 2016.
-
(2016)
Tech. Rep., Cryptology ePrint Archive 2016/199
-
-
Miller, A.1
Xia, Y.2
Croman, K.3
Shi, E.4
Song, D.5
-
48
-
-
84978173132
-
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
-
Mar
-
NAYAK, K., KUMAR, S., MILLER, A., AND SHI, E. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. In 1st IEEE European Symposium on Security and Privacy (Mar. 2015).
-
(2015)
1st IEEE European Symposium on Security and Privacy
-
-
Nayak, K.1
Kumar, S.2
Miller, A.3
Shi, E.4
-
49
-
-
84976810569
-
Reaching agreement in the presence of faults
-
PEASE, M., SHOSTAK, R., AND LAMPORT, L. Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 (1980), 228–234.
-
(1980)
Journal of the ACM (JACM)
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
51
-
-
12344258539
-
Efficient signature generation by smart cards
-
SCHNORR, C. P. Efficient signature generation by smart cards. Journal of Cryptology 4, 3 (1991), 161–174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
52
-
-
84945190736
-
The Ripple protocol consensus algorithm
-
SCHWARTZ, D., YOUNGS, N., AND BRITTO, A. The Ripple protocol consensus algorithm. Ripple Labs Inc White Paper (2014), 5.
-
(2014)
Ripple Labs Inc White Paper
, pp. 5
-
-
Schwartz, D.1
Youngs, N.2
Britto, A.3
-
53
-
-
84920743145
-
Accelerating bitcoin’s transaction processing
-
Not Chains, Dec
-
SOMPOLINSKY, Y., AND ZOHAR, A. Accelerating Bitcoin’s Transaction Processing. Fast Money Grows on Trees, Not Chains, Dec. 2013.
-
(2013)
Fast Money Grows on Trees
-
-
Sompolinsky, Y.1
Zohar, A.2
-
54
-
-
84987605384
-
Keeping authorities “honest or bust” with decentralized witness cosigning
-
May
-
SYTA, E., TAMAS, I., VISHER, D., WOLINSKY, D. I., L., GAILLY, N., KHOFFI, I., AND FORD, B. Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning. In 37th IEEE Symposium on Security and Privacy (May 2016).
-
(2016)
37th IEEE Symposium on Security and Privacy
-
-
Syta, E.1
Tamas, I.2
Visher, D.3
Wolinsky, D.I.L.4
Gailly, N.5
Khoffi, I.6
Ford, B.7
-
56
-
-
84966546490
-
The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication
-
Springer
-
VUKOLIĆ, M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security (2015), Springer, pp. 112–125.
-
(2015)
International Workshop on Open Problems in Network Security
, pp. 112-125
-
-
Vukolić, M.1
-
57
-
-
84945225986
-
Ethereum: A secure decentralised generalised transaction ledger
-
WOOD, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (2014).
-
(2014)
Ethereum Project Yellow Paper
-
-
Wood, G.1
-
58
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
May
-
YU, H., GIBBONS, P. B., KAMINSKY, M., AND XIAO, F. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In 29th IEEE Symposium on Security and Privacy (S&P) (May 2008).
-
(2008)
29th IEEE Symposium on Security and Privacy (S&P)
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
|