nirenzang / Optimal-Selfish-Mining-Strategies-in-BitcoinLinks
An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"
☆14Updated 8 years ago
Alternatives and similar repositories for Optimal-Selfish-Mining-Strategies-in-Bitcoin
Users that are interested in Optimal-Selfish-Mining-Strategies-in-Bitcoin are comparing it to the libraries listed below
Sorting:
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆29Updated 4 years ago
- Learning how to bulletproofs☆38Updated 6 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Blockchain Bibliography☆50Updated 2 years ago
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- Chainspace is a distributed ledger platform for high-integrity and transparent processing of transactions within a decentralized system.☆57Updated 6 years ago
- ☆71Updated 6 years ago
- Bitcoin and Blockchain Simulator☆194Updated 6 years ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 7 years ago
- Teechain: A Secure Payment Network with Asynchronous Blockchain Access☆56Updated 6 years ago
- This is a Sharding Simulator to study blockchain scalability.☆37Updated 3 years ago
- ☆43Updated 7 years ago
- Code repository for technical papers about selfish mining analysis.☆13Updated 2 years ago
- zk-SNARK parameter multi-party computation protocol☆175Updated 6 years ago
- A simple Python implementation of threshold BLS signatures.☆42Updated last year
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆62Updated 3 years ago
- OHIE - Blockchain scaling☆34Updated 4 years ago
- ☆51Updated 2 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆183Updated 3 years ago
- The Honey Badger of BFT Protocols☆322Updated 5 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Updated last year
- Simulation framework for non-standard mining strategies☆58Updated 3 years ago
- ☆24Updated 4 years ago
- Khalil, R. and Gervais, A. 2017. ACM Conference on Computer and Communications Security. Revive: Rebalancing Off-Blockchain Payment Netwo…☆31Updated 8 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆65Updated 2 years ago
- Research and implementation for non-interactive blockchain proofs of proofs of work☆50Updated 3 years ago
- Integration of Zerocash on Ethereum: https://arxiv.org/abs/1904.00905☆57Updated 2 years ago
- Implementation of the Practical Byzantine Fault Tolerant Algorithm (pbft)☆137Updated 3 years ago
- Minimalistic implementation of a linkable spontaneously anonymous group (LSAG) signature scheme with python over elliptic curves.☆30Updated 4 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Updated 9 years ago