1. Back A (2002) Hashcash-a denial of service counter-measure
2. Ball M, Rosen A, Sabin M, Vasudevan PN (2018) Proofs of work from worst-case assumptions. In: Advances in Cryptology-CRYPTO 2018: 38th Annual International Cryptology Conference. Santa Barbara, CA, USA, Springer International Publishing, pp 789–819
3. Coelho F (2008) An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees. In: International Conference on Cryptology in Africa. Springer, Berlin Heidelberg, pp 80–93
4. Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. In: Annual International Cryptology Conference. Springer, Berlin Heidelberg, pp 139–147
5. Dziembowski S, Faust S, Kolmogorov V, Pietrzak K (2015) Proofs of space. In: Annual Cryptology Conference. Springer, Berlin Heidelberg, pp 585–605