作者: Yogesh Malhotra
DOI: 10.2139/SSRN.2911623
关键词: Key management 、 Proof-of-work system 、 Computer security 、 Static key 、 Cryptographic protocol 、 Security of cryptographic hash functions 、 Hash-based message authentication code 、 Business 、 Cryptographic primitive 、 Random number generator attack
摘要: … using ASICs, include besides LTC: Litecoin, NVC: Novacoin, FTC: FeatherCoin, MNC: MinCoin, BBQ: BBQcoin, TAG: Tagcoin, MEG: Memorycoin, and BTCs/BTC2: Bitcoin Scrypt. Like …