Login / Signup

Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols.

Matheus V. X. FerreiraAadityan GaneshJack HouriganHannah HuhS. Matthew WeinbergCatherine Yu
Published in: CoRR (2024)
Keyphrases
  • worst case
  • neural network
  • knowledge base
  • sensor networks
  • theorem proving
  • optimal design
  • security protocols
  • data sets
  • closed form
  • optimal control