Author of the publication

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.

, , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 114-134. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Session Function Computation and Multicasting in Undirected Graphs., and . IEEE J. Sel. Areas Commun., 31 (4): 702-713 (2013)Interactive Interference Alignment., , and . IEEE J. Sel. Areas Commun., 32 (9): 1699-1706 (2014)ACeD: Scalable Data Availability Oracle., , , and . CoRR, (2020)Feedback Turbo Autoencoder., , , , , and . ICASSP, page 8559-8563. IEEE, (2020)Coded Merkle Tree: Solving Data Availability Attacks in Blockchains., , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 114-134. Springer, (2020)Minotaur: Multi-Resource Blockchain Consensus., , , , , , and . CCS, page 1095-1108. ACM, (2022)Themis: Fast, Strong Order-Fairness in Byzantine Consensus., , , , and . CCS, page 475-489. ACM, (2023)Optimal bootstrapping of PoW blockchains., , , , and . MobiHoc, page 231-240. ACM, (2022)ACeD: Scalable Data Availability Oracle., , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 299-318. Springer, (2021)PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work., , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 104-128. Springer, (2021)