Login / Signup
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Aljosha Judmayer
Nicholas Stifter
Alexei Zamyatin
Itay Tsabary
Ittay Eyal
Peter Gazi
Sarah Meiklejohn
Edgar R. Weippl
Published in:
Financial Cryptography Workshops (2021)
Keyphrases
</>
low cost
countermeasures
malicious users
cryptographic protocols
security threats
malicious attacks
data sets
information systems
website
computer networks
ddos attacks
watermarking method
security risks
denial of service attacks
digital image watermarking
differential power analysis