Two Attacks On Proof-of-Stake GHOST/Ethereum.
Joachim NeuErtem Nusret TasDavid TsePublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- countermeasures
- traffic analysis
- security threats
- watermarking scheme
- computer security
- malicious users
- theorem prover
- digital image watermarking
- proof theory
- security mechanisms
- linear logic
- watermarking technique
- mathematical proofs
- terrorist attacks
- denial of service attacks
- neural network
- dynamic range
- security issues
- watermarking algorithm
- theorem proving
- network traffic