1. Abraham, I., Gueta, G., & Malkhi, D. (2018). Hot-stuff the linear, optimal-resilience, one-message bft devil. arXiv:1803.05069. https://arxiv.org/pdf/1803.05069.pdf
2. Aiyer, A. S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., & Porth, C. (2005). Bar fault tolerance for cooperative services. In ACM SIGOPS Operating Systems Review (Vol. 39, pp. 45–58). New York, NY: ACM. http://www.dcc.fc.up.pt/~Ines/aulas/1314/SDM/papers/BAR%20Fault%20Tolerance%20for%20Cooperative%20Services%20-%20UIUC.pdf
3. Androulaki, E., Capkun, S., & Karame, G. O. (2012). Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In CCS. http://eprint.iacr.org/2012/248.pdf
4. Aspnes, J., Jackson, C., & Krishnamurthy, A. (2005). Exposing Computationally-Challenged Byzantine Impostors. Department of Computer Science, Yale University, New Haven, CT, Tech. Rep. http://www.cs.yale.edu/homes/aspnes/papers/tr1332.pdf
5. Back, A. (2002). Hashcash-a denial of service counter-measure. Retrieved March 9, 2016, from http://www.hashcash.org/papers/hashcash.pdf