Author:
Boneh Dan,Partap Aditi,Rotem Lior
Publisher
Springer Nature Switzerland
Reference61 articles.
1. Asayag, A., et al.: Helix: a scalable and fair consensus algorithm resistant to ordering manipulation. Cryptology ePrint Archive, Report 2018/863 (2018). https://eprint.iacr.org/2018/863
2. Babel, K., Daian, P., Kelkar, M., Juels, A.: Clockwork finance: automated analysis of economic security in smart contracts. In: IEEE S &P, pp. 2499–2516. IEEE (2023)
3. Lecture Notes in Computer Science;B Bauer,2020
4. Bebel, J., Ojha, D.: Ferveo: threshold decryption for mempool privacy in BFT networks. Cryptology ePrint Archive, Report 2022/898 (2022). https://eprint.iacr.org/2022/898
5. Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM CCS 2006, pp. 390–399. ACM Press, Alexandria, Virginia, USA, 30 October–3 November 2006. https://doi.org/10.1145/1180405.1180453