打字猴:1.703868187e+09
1703868187 延伸阅读
1703868188
1703868189 定义刚性内存功能和建议范本的论文是:
1703868190
1703868191 Percival, Colin.“Stronger Key Derivation via Sequential Memory-Hard Functions,” 2009.
1703868192
1703868193 您可以通过如下网址阅读:
1703868194
1703868195 https://www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf.
1703868196
1703868197 关于内存范围(memory-bound)功能的早期论文包括:
1703868198
1703868199 Abadi, Martin, Mike Burrows, Mark Manasse, and Ted Wobber.“Moderately Hard, Memory-Bound Functions.” ACM Transactions on Internet Technology 5(2), 2005.
1703868200
1703868201 Dwork, Cynthia, Andrew Goldberg, and Moni Naor.“On Memory-Bound Functions for Fighting Spam.” In Advances in Cryptology—Crypto 2003 . Berlin: Springer, 2003.
1703868202
1703868203 关于Cuckoo Cycle proposal的研究包括:
1703868204
1703868205 Tromp, John.“Cuckoo Cycle: A Memory-Hard Proof-of-Work System.” IACR Cryptology ePrint Archive, 2014.
1703868206
1703868207 您可以通过以下网址阅读:
1703868208
1703868209 https://eprint.iacr.org/2014/059.pdf.
1703868210
1703868211 关于永久币的介绍请参阅:
1703868212
1703868213 Miller, Andrew, Ari Juels, Elaine Shi, Bryan Parno, and Justin Katz.“Permacoin: Repurposing Bitcoin Work for Data Preservation.” In Proceedings of the 2014 IEEE Symposium on Security and Privacy , 2014.
1703868214
1703868215 您可以通过如下网址阅读:
1703868216
1703868217 http://research.microsoft.com/pubs/217984/permacoin.pdf.
1703868218
1703868219 讨论不同的哈希函数和SHA-3竞争的论文是:
1703868220
1703868221 Preneel, Bart.“The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.” In Topics in Cryptology—CT-RSA,2010 . Berlin: Springer, 2010.
1703868222
1703868223 关于不可外包谜题的介绍是:
1703868224
1703868225 Miller, Andrew, Elaine Shi, Ahmed Kosba, and Jonathan Katz.“Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.” In Proceedings of the 22nd ACM Conference on Computer and Communications Security , forthcoming.
1703868226
1703868227
1703868228
1703868229
1703868230 区块链技术驱动金融:数字货币与智能合约技术 [:1703863960]
1703868231 区块链技术驱动金融:数字货币与智能合约技术 第9章 比特币“平台”
1703868232
1703868233
1703868234
1703868235
1703868236 在前面的章节里,我们展示了比特币的技术基础架构和它作为货币的机理。现在我们来探讨除了货币之外,比特币可以作为核心组成部分的其他应用。这些应用,有些是直接利用了比特币的当前特性,并未做任何修改,而更多的则是需要做一些微小调整的。
[ 上一页 ]  [ :1.703868187e+09 ]  [ 下一页 ]