Login / Signup
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft).
Lear Bahack
Published in:
CoRR (2013)
Keyphrases
</>
computational power
parallel processing
computing power
countermeasures
memory requirements
communication technologies
low cost
theoretical analysis
credit card
malicious attacks
watermarking scheme
watermarking algorithm
security mechanisms
denial of service attacks