Two More Attacks on Proof-of-Stake GHOST/Ethereum.
Joachim NeuErtem Nusret TasDavid TsePublished in: ConsensusDay@CCS (2022)
Keyphrases
- countermeasures
- malicious attacks
- theorem proving
- watermarking scheme
- traffic analysis
- dynamic range
- security threats
- malicious users
- multiscale
- linear logic
- security mechanisms
- chosen plaintext
- natural deduction
- data publishing
- computer security
- watermarking algorithm
- theorem prover
- image quality
- signal processing