Login / Signup
Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols.
Matheus V. X. Ferreira
Aadityan Ganesh
Jack Hourigan
Hannah Huh
S. Matthew Weinberg
Catherine Yu
Published in:
CoRR (2024)
Keyphrases
</>
worst case
neural network
knowledge base
sensor networks
theorem proving
optimal design
security protocols
data sets
closed form
optimal control