Niko crypto

Comment

Author: Admin | 2025-04-28

Consensus in the presence of partial synchrony. Journal of the ACM 35, 2 (1988), 288–323. DOI:[31]Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In CRYPTO, Ernest F. Brickell (Ed.). Lecture Notes in Computer Science, Vol. 740. Springer, 139–147.[32]Ittay Eyal and Emin Gun Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the Financial Cryptography.[33]Pesech Feldman and Silvio Micali. 1997. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM Journal of the Computing 26, 4 (1997), 873–933.[34]Michael J. Fischer, Nancy A. Lynch, and Mike Paterson. 1985. Impossibility of distributed consensus with one faulty process. Journal of the ACM 32, 2 (1985), 374–382.[35]Matthias Fitzi and Juan A. Garay. 2003. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing, Elizabeth Borowsky and Sergio Rajsbaum (Eds.). ACM, 211–220.[36]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Parallel chains: Improving throughput and latency of blockchain protocols via parallel composition. IACR Cryptology ePrint Archive 2018 (2018), 1119. Retrieved from https://eprint.iacr.org/2018/1119[37]Juan Garay and Aggelos Kiayias. 2018. SoK: A Consensus Taxonomy in the Blockchain Era. Cryptology ePrint Archive, Report 2018/754. (2018). Retrieved from https://eprint.iacr.org/2018/754[38]Juan A. Garay, Jonathan Katz, Ranjit Kumaresan, and Hong-Sheng Zhou. 2011. Adaptively secure broadcast, revisited. In Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, Cyril Gavoille and Pierre Fraigniaud (Eds.). ACM, 179–186. DOI:[39]Juan A. Garay and Aggelos Kiayias. 2020. SoK: A consensus taxonomy in the blockchain era. In Proceedings of the Topics in Cryptology - CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, Proceedings, Stanislaw Jarecki (Ed.). Lecture Notes in Computer Science, Vol. 12006. Springer, 284–318. DOI:[40]Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and applications. In Proceeding of the Advances in Cryptology - EUROCRYPT 2015-34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II. 281–310. DOI:[41]Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2017. The Bitcoin Backbone protocol with chains of variable difficulty. In Proceeding of the Advances in Cryptology - CRYPTO 2017-37th Annual International Cryptology Conference, Proceedings, Part I, Jonathan Katz and Hovav Shacham (Eds.). Lecture Notes in Computer Science, Vol. 10401. Springer, 291–323. DOI:[42]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, and Giorgos Panagiotakos. 2018. Bootstrapping the blockchain, with applications to consensus and fast PKI setup. In Proceedings of the Public-Key Cryptography - PKC

Add Comment