Login / Signup
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
Aljosha Judmayer
Nicholas Stifter
Alexei Zamyatin
Itay Tsabary
Ittay Eyal
Peter Gazi
Sarah Meiklejohn
Edgar R. Weippl
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
countermeasures
theorem prover
watermarking scheme
traffic analysis
denial of service attacks
malicious attacks
genetic algorithm
signal processing
terrorist attacks
mathematical proofs
watermarking algorithm
security mechanisms
social welfare
linear logic
security risks
digital image watermarking