The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining.

作者: Nicolas T. Courtois , Marek Grajek , Rahul Naik

DOI:

关键词:

摘要: … SHA-256 in the cryptographic literature, see for example [44,50]. We start by recalling how the SHA-256 … Jonathan Heusser: SAT solving - An alternative to brute force bitcoin mining, 03 …

参考文章(17)
Dorit Ron, Adi Shamir, Quantitative Analysis of the Full Bitcoin Transaction Graph financial cryptography. pp. 6- 24 ,(2013) , 10.1007/978-3-642-39884-1_2
Mooseop Kim, Jaecheol Ryou, Sungik Jun, Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing information security and cryptology. pp. 240- 252 ,(2009) , 10.1007/978-3-642-01440-6_19
Christian Rechberger, Vincent Rijmen, Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Analysis of simplified variants of SHA-256 Science & Engineering Faculty. pp. 123- 134 ,(2005)
Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang, Preimages for Step-Reduced SHA-2 international conference on the theory and application of cryptology and information security. pp. 578- 597 ,(2009) , 10.1007/978-3-642-10366-7_34
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
N. Sklavos, O. Koufopavlou, On the hardware implementations of the SHA-2 (256, 384, 512) hash functions international symposium on circuits and systems. ,vol. 5, pp. 153- 156 ,(2003) , 10.1109/ISCAS.2003.1206214
Joan Boyar, Philip Matthews, René Peralta, Logic Minimization Techniques with Applications to Cryptology Journal of Cryptology. ,vol. 26, pp. 280- 312 ,(2013) , 10.1007/S00145-012-9124-7
Jacob Aron, What's wrong with Bitcoin? New Scientist. ,vol. 221, pp. 19- 20 ,(2014) , 10.1016/S0262-4079(14)60271-2