Login / Signup
Two More Attacks on Proof-of-Stake GHOST/Ethereum.
Joachim Neu
Ertem Nusret Tas
David Tse
Published in:
ConsensusDay@CCS (2022)
Keyphrases
</>
countermeasures
malicious attacks
theorem proving
watermarking scheme
traffic analysis
dynamic range
security threats
malicious users
multiscale
linear logic
security mechanisms
chosen plaintext
natural deduction
data publishing
computer security
watermarking algorithm
theorem prover
image quality
signal processing
email