Author of the publication

Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus.

, , , , , and . Sensors, 21 (19): 6408 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus., , , , , and . Sensors, 21 (19): 6408 (2021)A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance., , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 275-293. Springer, (2022)Influence of addition modulo 2 n on algebraic attacks., , and . Cryptogr. Commun., 8 (2): 277-289 (2016)Privacy-Preserving Decision-Making Over Blockchain., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4648-4663 (November 2023)Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation., , , and . IDAACS (2), page 743-746. IEEE, (2011)978-1-4577-1426-9.A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent., , and . IACR Cryptology ePrint Archive, (2013)Trustless Cross-chain Communication for Zendoo Sidechains., , and . IACR Cryptol. ePrint Arch., (2022)The Method of Searching for Differential Trails of ARX-based Block Cipher Cypress., and . DESSERT, page 157-160. IEEE, (2020)Analysis of splitting attacks on Bitcoin and GHOST consensus protocols., , , , , and . IDAACS, page 978-982. IEEE, (2017)Number of confirmation blocks for Bitcoin and GHOST consensus protocols on networks with delayed message delivery: Extended abstract., , , , , and . CRYBLOCK@MobiSys, page 42-47. ACM, (2018)