1. Lecture Notes in Computer Science;M Andrychowicz,2015
2. Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing Computationally-Challenged Byzantine Impostors. Department of Computer Science, Yale University, New Haven, CT, Technical Report (2005)
3. Bahack, L.: Theoretical bitcoin attacks with less than half of the computational power (draft). Cryptology ePrint Archive, Report 2013/868 (2013).
http://eprint.iacr.org/
4. Bonneau, J.: Ethiks: Using ethereum to audit a coniks key transparency log
5. Ethan Heilman, S.G., Kendler, A., Zohar, A.: Eclipse attacks on bitcoin’s peer-to-peer network. Cryptology ePrint Archive, Report 2015/263 (2015).
http://eprint.iacr.org/