1/ Sybil attacks: http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf … 2/Intrapolynomial cryptography: http://szabo.best.vwh.net/intrapoly.html 3/Timestamping: http://www.upf.pf/~gabillon/articles/AnnalTelecom.pdf …
-
-
-
4/ Bitcoin white paper: https://bitcoin.org/bitcoin.pdf 5/ Nakamoto consensus as anon & probabilistic Byzantine consensus: https://socrates1024.s3.amazonaws.com/consensus.pdf
-
6/ State machine replication: http://ecommons.library.cornell.edu/bitstream/1813/6640/2/86-800.ps … 7/Ethereum: https://www.ethereum.org/pdfs/EthereumWhitePaper.pdf … 8/Asset registries: http://szabo.best.vwh.net/securetitle.html …
End of conversation
New conversation -
-
-
@NickSzabo4 this would be a great mooc (or educational blog post series)Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@NickSzabo4 Thanks Nick, also any recs for attack modeling and proof of security for cryptoledgers?@el33th4xor@socrates1024 -
@byrongibson@NickSzabo4@el33th4xor This recent paper by Garay et al. is my current favorite http://eprint.iacr.org/2014/765
End of conversation
New conversation -
-
This Tweet is unavailable
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.