Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flux: Revisiting Near Blocks for Proof-of-Work Blockchains., , , , and . IACR Cryptology ePrint Archive, (2018)SoK: Communication Across Distributed Ledgers., , , , , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 3-36. Springer, (2021)Echoes of the Past: Recovering Blockchain Metrics From Merged Mining., , , , , and . IACR Cryptology ePrint Archive, (2018)Agreement with Satoshi - On the Formalization of Nakamoto Consensus., , , , and . IACR Cryptology ePrint Archive, (2018)Merged Mining: Curse of Cure?, , , , and . IACR Cryptology ePrint Archive, (2017)Bitcoin - Cryptocurrencies and Alternative Applications., , , and . ERCIM News, (2017)SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies., , , , , , , and . IACR Cryptol. ePrint Arch., (2020)On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures., and . IACR Cryptol. ePrint Arch., (2021)SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies., , , , , , , and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 507-532. Springer, (2021)XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets., , , , , and . IEEE Symposium on Security and Privacy, page 193-210. IEEE, (2019)