-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
64 lines (58 loc) · 2.88 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
@inproceedings{Dwork93,
author="Dwork, Cynthia
and Naor, Moni",
editor="Brickell, Ernest F.",
title="Pricing via Processing or Combatting Junk Mail",
booktitle="Advances in Cryptology --- CRYPTO' 92",
year="1993",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="139--147",
abstract="We present a computational technique for combatting junk mail in particular and controlling access to a shared resource in general. The main idea is to require a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use. To this end we suggest several pricing functions, based on, respectively, extracting square roots modulo a prime, the Fiat-Shamir signature scheme, and the Ong-Schnorr-Shamir (cracked) signature scheme.",
isbn="978-3-540-48071-6"
}
@inbook{Jakobsson99,
author="Jakobsson, Markus
and Juels, Ari",
editor="Preneel, Bart",
title="Proofs of Work and Bread Pudding Protocols(Extended Abstract)",
bookTitle="Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20--21, 1999, Leuven, Belgium",
year="1999",
publisher="Springer US",
address="Boston, MA",
pages="258--272",
abstract="We formalize the notion of a proof of work (POW). In many cryptographic protocols, a prover seeks to convince a verifier that she possesses knowledge of a secret or that a certain mathematical relation holds true. By contrast, in a POW, a prover demonstrates to a verifier that she has performed a certain amount of computational work in a specified interval of time. POWs have served as the basis of a number of security protocols in the literature, but have hitherto lacked careful characterization. In this paper, we offer definitions treating the notion of a POW and related concepts.",
isbn="978-0-387-35568-9",
doi="10.1007/978-0-387-35568-9_18",
url="https://doi.org/10.1007/978-0-387-35568-9_18"
}
@misc{cryptoslate20,
title={Proof of Work Cryptocurrencies},
author={CryptoSlate},
url={https://cryptoslate.com/cryptos/proof-of-work/},
year={2020}
}
@article{ieabtcenergy20,
title={Bitcoin energy use estimates},
url={https://www.iea.org/data-and-statistics/charts/bitcoin-energy-use-estimates},
author={International Energy Agency},
year={2019}
}
@article{enerdata,
title={Electricity domestic consumption},
url={https://yearbook.enerdata.net/electricity/electricity-domestic-consumption-data.html},
author={Enerdata},
year={2020}
}
@techreport{back02hashcash,
author = {Adam Back},
title = {Hashcash - A Denial of Service Counter-Measure},
institution = {},
year = {2002}
}
@article{barker_kelsey_2015,
title={Recommendation for Random Number Generation Using Deterministic Random Bit Generators},
DOI={10.6028/nist.sp.800-90ar1},
author={Barker, Elaine B. and Kelsey, John M.},
year={2015}
}