nirenzang / Optimal-Selfish-Mining-Strategies-in-Bitcoin
An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Optimal-Selfish-Mining-Strategies-in-Bitcoin
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆26Updated 3 years ago
- Code repository for technical papers about selfish mining analysis.☆12Updated last year
- Blockchain Bibliography☆50Updated last year
- The Honey Badger of BFT Protocols☆137Updated 2 years ago
- Learning how to bulletproofs☆34Updated 5 years ago
- ☆79Updated 8 years ago
- ☆44Updated 6 years ago
- Integration of Zerocash on Ethereum: https://arxiv.org/abs/1904.00905☆57Updated last year
- ☆63Updated 6 years ago
- Simulation framework for non-standard mining strategies☆54Updated 2 years ago
- Simulation of several BFT consensus algorithms for benchmarking☆24Updated 5 years ago
- ☆24Updated 3 years ago
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆60Updated 2 years ago
- Fast Blockchain Simulations for Large-scale Peer-to-Peer Networks☆78Updated last year
- Confidentiality-Preserving Smart Contract Platform☆21Updated 4 years ago
- Teechain: A Secure Payment Network with Asynchronous Blockchain Access☆51Updated 5 years ago
- OHIE - Blockchain scaling☆34Updated 3 years ago
- Bitcoin and Blockchain Simulator☆187Updated 5 years ago
- Khalil, R. and Gervais, A. 2017. ACM Conference on Computer and Communications Security. Revive: Rebalancing Off-Blockchain Payment Netwo…☆31Updated 7 years ago
- Python implementation of Byzantine Fault Tolerant Raft algorithm☆11Updated 6 years ago
- ☆69Updated 5 years ago
- Sample implementation of NSEC5 cryptography☆23Updated 6 years ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 6 years ago
- Implementation of the Practical Byzantine Fault Tolerant Algorithm (pbft)☆135Updated 2 years ago
- Omniledger implementation☆35Updated 6 years ago
- Source code for IMC 2016 submission☆31Updated 8 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆172Updated 2 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆31Updated 9 months ago
- Minimalistic implementation of a linkable spontaneously anonymous group (LSAG) signature scheme with python over elliptic curves.☆28Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆60Updated 3 years ago