New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks.
Gilad SternIttai AbrahamPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- lower bound
- upper bound
- open source
- branch and bound algorithm
- upper and lower bounds
- objective function
- source code
- countermeasures
- lower and upper bounds
- branch and bound
- vc dimension
- traffic analysis
- development environments
- worst case
- np hard
- malicious attacks
- special case
- security protocols
- optimal solution
- terrorist attacks
- security mechanisms
- watermarking algorithm
- watermarking scheme
- software projects
- quadratic assignment problem
- lower bounding
- security threats
- security risks
- search algorithm
- malicious users
- set of randomly generated instances