1703868187
延伸阅读
1703868188
1703868189
定义刚性内存功能和建议范本的论文是:
1703868190
1703868191
Percival, Colin.“Stronger Key Derivation via Sequential Memory-Hard Functions,” 2009.
1703868192
1703868193
您可以通过如下网址阅读:
1703868194
1703868195
https://www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf.
1703868196
1703868197
关于内存范围(memory-bound)功能的早期论文包括:
1703868198
1703868199
Abadi, Martin, Mike Burrows, Mark Manasse, and Ted Wobber.“Moderately Hard, Memory-Bound Functions.” ACM Transactions on Internet Technology 5(2), 2005.
1703868200
1703868201
Dwork, Cynthia, Andrew Goldberg, and Moni Naor.“On Memory-Bound Functions for Fighting Spam.” In Advances in Cryptology—Crypto 2003 . Berlin: Springer, 2003.
1703868202
1703868203
关于Cuckoo Cycle proposal的研究包括:
1703868204
1703868205
Tromp, John.“Cuckoo Cycle: A Memory-Hard Proof-of-Work System.” IACR Cryptology ePrint Archive, 2014.
1703868206
1703868207
您可以通过以下网址阅读:
1703868208
1703868209
https://eprint.iacr.org/2014/059.pdf.
1703868210
1703868211
关于永久币的介绍请参阅:
1703868212
1703868213
Miller, Andrew, Ari Juels, Elaine Shi, Bryan Parno, and Justin Katz.“Permacoin: Repurposing Bitcoin Work for Data Preservation.” In Proceedings of the 2014 IEEE Symposium on Security and Privacy , 2014.
1703868214
1703868215
您可以通过如下网址阅读:
1703868216
1703868217
http://research.microsoft.com/pubs/217984/permacoin.pdf.
1703868218
1703868219
讨论不同的哈希函数和SHA-3竞争的论文是:
1703868220
1703868221
Preneel, Bart.“The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.” In Topics in Cryptology—CT-RSA,2010 . Berlin: Springer, 2010.
1703868222
1703868223
关于不可外包谜题的介绍是:
1703868224
1703868225
Miller, Andrew, Elaine Shi, Ahmed Kosba, and Jonathan Katz.“Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.” In Proceedings of the 22nd ACM Conference on Computer and Communications Security , forthcoming.
1703868226
1703868227
1703868228
1703868229
1703868231
区块链技术驱动金融:数字货币与智能合约技术 第9章 比特币“平台”
1703868232
1703868233
1703868234
1703868235
1703868236
在前面的章节里,我们展示了比特币的技术基础架构和它作为货币的机理。现在我们来探讨除了货币之外,比特币可以作为核心组成部分的其他应用。这些应用,有些是直接利用了比特币的当前特性,并未做任何修改,而更多的则是需要做一些微小调整的。
[
上一页 ]
[ :1.703868187e+09 ]
[
下一页 ]