Bitcoin and beyond: A technical survey on decentralized digital currencies

F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …

A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives

S Quamara, AK Singh - Computers & Security, 2022 - Elsevier
Cryptocurrencies are emerging as virtual financial systems based on their innovative
decentralized and distributed strategy in order to provide astonishing capabilities across a …

Proofs of space

S Dziembowski, S Faust, V Kolmogorov… - Annual Cryptology …, 2015 - Springer
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …

Proof-of-learning: Definitions and practice

H Jia, M Yaghini, CA Choquette-Choo… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Training machine learning (ML) models typically involves expensive iterative optimization.
Once the model's final parameters are released, there is currently no mechanism for the …

Efficient cache attacks on AES, and countermeasures

E Tromer, DA Osvik, A Shamir - Journal of Cryptology, 2010 - Springer
We describe several software side-channel attacks based on inter-process leakage through
the state of the CPU's memory cache. This leakage reveals memory access patterns, which …

[PDF][PDF] CryptoNote v 2.0

N Van Saberhagen - 2013 - getmonero.org
“Bitcoin”[1] has been a successful implementation of the concept of p2p electronic cash.
Both professionals and the general public have come to appreciate the convenient …

The moral character of cryptographic work

P Rogaway - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Cryptography rearranges power: it configures who can do what, from what. This makes
cryptography an inherently\textit {political} tool, and it confers on the field an intrinsically\textit …

Observation-based cooperation enforcement in ad hoc networks

S Bansal, M Baker - arXiv preprint cs/0307012, 2003 - arxiv.org
Ad hoc networks rely on the cooperation of the nodes participating in the network to forward
packets for each other. A node may decide not to cooperate to save its resources while still …

Detecting identity-based attacks in wireless networks using signalprints

DB Faria, DR Cheriton - Proceedings of the 5th ACM workshop on …, 2006 - dl.acm.org
Wireless networks are vulnerable to many identity-based attacks in which a malicious device
uses forged MAC addresses to masquerade as a specific client or to create multiple …

Equihash: Asymmetric proof-of-work based on the generalized birthday problem

A Biryukov, D Khovratovich - Ledger, 2017 - ledgerjournal.org
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice
protection tools, but the requirement for fast verification so far has made it an easy prey for …