Login / Signup
Private attacks in longest chain proof-of-stake protocols with single secret leader elections.
Sarah Azouvi
Daniele Cappelletti
Published in:
AFT (2021)
Keyphrases
</>
security protocols
privacy preserving
countermeasures
computational complexity
special case
upper bound
anomaly detection
theorem proving