1. Nakamoto S. Bitcoin : A peer-to-peer electronic cash system[J] . Consulted , 2008 . Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Consulted, 2008.
2. Ittay Eyal and Emin G . Sirer.Majority is not enough:Bitcoin mining is vulnerable.In Financial Crupotography and Data Security,volume 8437 of Lecture Notes in Computer Science,Pages 436-454 . Springer-Verlag . 2014 Ittay Eyal and Emin G.Sirer.Majority is not enough:Bitcoin mining is vulnerable.In Financial Crupotography and Data Security,volume 8437 of Lecture Notes in Computer Science,Pages 436-454.Springer-Verlag.2014
3. Yonatan Sompolinsky and Aviv Zohar.Secure high-rate trancaction processing in bitcoin.In Financial Cryptography and Data Security volume 8975 of Lecture Notes in Computer Science pages 507-527 Yonatan Sompolinsky and Aviv Zohar.Secure high-rate trancaction processing in bitcoin.In Financial Cryptography and Data Security volume 8975 of Lecture Notes in Computer Science pages 507-527
4. Trom J. Cuckoo cycle: a memory bound graph-theoretic proof-of-work[C]//International Conference on Financial Cryptography and Data Security . Springer , Berlin, Heidelberg , 2015 : 49-62. Trom J. Cuckoo cycle: a memory bound graph-theoretic proof-of-work[C]//International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015: 49-62.
5. Arthur Gervais Ghassan O.Karame Karl Wust Vasileios Glykantzis Hubert Ritzdorf and Srdjan Capkun.On the security and performance of proof of work blockchains.In ACM SIGSAC Conference on Computer and Communications Security Press 2016. Arthur Gervais Ghassan O.Karame Karl Wust Vasileios Glykantzis Hubert Ritzdorf and Srdjan Capkun.On the security and performance of proof of work blockchains.In ACM SIGSAC Conference on Computer and Communications Security Press 2016.