No More Attacks on Proof-of-Stake Ethereum?
Francesco D'AmatoJoachim NeuErtem Nusret TasDavid TsePublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- countermeasures
- theorem proving
- malicious attacks
- theorem prover
- traffic analysis
- neural network
- malicious users
- linear logic
- terrorist attacks
- real time
- computer security
- watermarking algorithm
- security threats
- security risks
- denial of service attacks
- natural deduction
- watermarking scheme
- digital image watermarking
- data corruption
- chosen plaintext