-
#1Analysis of Attacks on Blockchain Consensus: Double-Spend and Eclipse AttacksEconomic evaluation of double-spend attacks in blockchain systems, analyzing transaction security, mining power requirements, and the impact of eclipse attacks on consensus.
-
#2Impossibility of Full Decentralization in Permissionless BlockchainsAnalysis of decentralization limitations in blockchain consensus protocols, focusing on Sybil costs and economic incentives across PoW, PoS, and DPoS systems.
-
#3Quantifying Blockchain Extractable Value: Security Risks and Economic ImpactComprehensive analysis of Blockchain Extractable Value (BEV) quantifying $540.54M extracted through sandwich attacks, liquidations, and arbitrage over 32 months, with security implications for blockchain consensus.
-
#4From Griefing to Stability in Blockchain Mining EconomiesAnalysis of griefing behavior in blockchain mining economies, game-theoretic models, evolutionary stability, and convergence to market equilibria via proportional response protocols.
-
#5From Grieving to Stability in Blockchain Mining Economies: A Game-Theoretic AnalysisAnalysis of grieving behavior in blockchain mining economies, evolutionary stability, and convergence to market equilibria via proportional response protocols.
-
#6Blockchain Selfish Mining: Multi-Pool Analysis and Security ImplicationsComprehensive analysis of selfish mining in blockchain with multiple misbehaving pools, Markov chain modeling, profitability thresholds, and security implications for PoW consensus.
-
#7Unstable Throughput: When the Difficulty Algorithm Breaks - Analysis of Bitcoin Cash's Mining InstabilityAnalysis of Bitcoin Cash's difficulty algorithm instability, mathematical derivation of NEFDA solution, and empirical comparison demonstrating improved transaction throughput stability.
-
#8hashratecoin - Technical Documentation and ResourcesComprehensive technical documentation and resources about hashratecoin technology and applications.
-
#9HaPPY-Mine: Designing a Mining Reward Function for Blockchain DecentralizationAnalysis of HaPPY-Mine, a novel mining reward function that pegs reward value to system hashrate to promote decentralization in blockchain networks.
-
#10Multi-Factor Inception Networks for Cryptocurrency TradingAnalysis of MFIN framework for systematic cryptocurrency trading using multiple factors and deep learning techniques to optimize portfolio Sharpe ratio.
-
#11Optical Proof of Work: A CAPEX-Based Alternative to Energy-Intensive Cryptocurrency MiningAnalysis of Optical Proof of Work (oPoW), a novel cryptocurrency mining algorithm that shifts costs from electricity to hardware using silicon photonics technology.
-
#12ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksAnalysis of ADESS protocol modifications to proof-of-work blockchain systems that increase security against double-spend attacks through temporal sequencing and exponential penalties.
-
#13ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksADESS protocol modification for PoW blockchains to increase security against double-spend attacks through temporal sequence analysis and exponential penalty mechanisms.
-
#14Selfish Mining in Ethereum: Combinatorial Analysis and Strategy ComparisonAnalysis of selfish mining strategies in Ethereum, comparing profitability and impact on difficulty adjustment. Includes closed-form formulas using Dyck words combinatorics.
-
#15Undetectable Selfish Mining: Analysis of Blockchain Security VulnerabilitiesResearch paper analyzing statistically undetectable selfish mining strategies in blockchain protocols, including profitability thresholds and detection evasion techniques.
Last updated: 2025-11-25 20:35:04