nirenzang / Optimal-Selfish-Mining-Strategies-in-Bitcoin
An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"
☆13Updated 7 years ago
Alternatives and similar repositories for Optimal-Selfish-Mining-Strategies-in-Bitcoin:
Users that are interested in Optimal-Selfish-Mining-Strategies-in-Bitcoin are comparing it to the libraries listed below
- The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”☆27Updated 3 years ago
- Code repository for technical papers about selfish mining analysis.☆12Updated last year
- Learning how to bulletproofs☆35Updated 6 years ago
- ☆44Updated 6 years ago
- Teechain: A Secure Payment Network with Asynchronous Blockchain Access☆53Updated 5 years ago
- Accumulators and Vector Commitments☆43Updated 2 years ago
- Confidentiality-Preserving Smart Contract Platform☆21Updated 5 years ago
- Omniledger implementation☆35Updated 6 years ago
- This is a Sharding Simulator to study blockchain scalability.☆37Updated 2 years ago
- The Honey Badger of BFT Protocols☆141Updated 2 years ago
- A simple Python implementation of threshold BLS signatures.☆39Updated 11 months ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 7 years ago
- ☆49Updated last year
- ☆79Updated 8 years ago
- Bitcoin and Blockchain Simulator☆193Updated 6 years ago
- Blockchain Bibliography☆50Updated last year
- ☆71Updated 6 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆178Updated 2 years ago
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆63Updated 3 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆32Updated last year
- ☆25Updated 6 years ago
- Source code for the ICDE 2023 paper "Scaling Blockchain Consensus via a Robust Shared Mempool"☆27Updated 2 years ago
- OHIE - Blockchain scaling☆34Updated 4 years ago
- Khalil, R. and Gervais, A. 2017. ACM Conference on Computer and Communications Security. Revive: Rebalancing Off-Blockchain Payment Netwo…☆31Updated 7 years ago
- Simulation of several BFT consensus algorithms for benchmarking☆26Updated 5 years ago
- Discrete-event simulation for BFT consensus protocols☆47Updated 3 years ago
- ☆38Updated 6 years ago
- Simulation framework for non-standard mining strategies☆57Updated 3 years ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆24Updated 2 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆95Updated 2 years ago