Code repository for technical papers about selfish mining analysis.
☆13May 16, 2023Updated 2 years ago
Alternatives and similar repositories for pto-selfish-mining
Users that are interested in pto-selfish-mining are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Investigating the frequency of alternative blocks, reorganizations, potential double-spend attacks, selfish mining, and more.☆14Nov 21, 2020Updated 5 years ago
- An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"☆14May 30, 2017Updated 8 years ago
- Omnet Simulator for Spider - Routing algorithms for Cryptocurrencies☆15Apr 4, 2021Updated 4 years ago
- PoUW enables PAI Coin to serve a dual purpose: (1) As a typical cryptocurrency, like Bitcoin, Ethereum, and many others, and (2) as a com…☆11Jan 18, 2022Updated 4 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- traces and simulation/testbed code for offchain routing☆17Jun 21, 2022Updated 3 years ago
- SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning☆63Feb 16, 2023Updated 3 years ago
- A specification of the CBC Casper consensus protocols written in TLA+ and PlusCal (transpiled to TLA+)☆20Aug 12, 2019Updated 6 years ago
- A smart contract and arbitrate oracle service on LightningNetwork☆13May 13, 2019Updated 6 years ago
- Resources from paper "(In)Stability for the Blockchain: Deleveraging Spirals and Stablecoin Attacks"☆19Oct 24, 2021Updated 4 years ago
- TU Delft Blockchain Engineering course project on scale-out distributed ledger☆13Mar 4, 2018Updated 8 years ago
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- ☆13May 5, 2023Updated 2 years ago
- A rust implementation of Alexey Akhunov's multiproof algorithm☆33Sep 17, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple SDN load balancer developed with ryu☆10Sep 19, 2018Updated 7 years ago
- Software Defined Networking, Network Slicing, Traffic Classification, Flow Scheduling, Mininet, RYU.☆10Apr 24, 2022Updated 3 years ago
- A discrete event Blockchain Simulator☆70May 19, 2020Updated 5 years ago
- this sdn project would use the ryu controller and classify the flows as being the elephant or mice depending upon time and bandwidth☆10Mar 3, 2021Updated 5 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- A Web-Application based service which can control/assign the bandwidth of a Virtual Network based on Mininet using RYU as the SDN Control…☆12Apr 24, 2020Updated 5 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have…☆30Dec 19, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Http traffic load balance done through ryu controller, implemented on mininet.☆12Aug 22, 2017Updated 8 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- This is a Sharding Simulator to study blockchain scalability.☆38Jun 21, 2022Updated 3 years ago
- ☆46Oct 19, 2021Updated 4 years ago
- Invertible Bloom Lookup Table implementation in C++☆57Feb 3, 2022Updated 4 years ago
- Ryu python SDN controller with Neural Network integration for predicting anomaly in computer network.☆11Feb 14, 2019Updated 7 years ago
- A guide to smart contract security best practices☆19Mar 28, 2025Updated last year
- Open source platform for the privacy-preserving machine learning lifecycle☆17Aug 18, 2023Updated 2 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Nov 13, 2018Updated 7 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Polkadot Protocol Conformance Tests☆10May 22, 2023Updated 2 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago