-
#1Bitcoin Price and Mining Cost: Causality Analysis and Economic FrameworkEconomic analysis explaining why bitcoin mining costs follow price movements rather than preceding them, with technical models and future applications.
-
#2Analysis of Attacks on Blockchain Consensus: Double-Spend and Eclipse AttacksEconomic evaluation of double-spend attacks in blockchain systems, analyzing transaction security, mining power requirements, and the impact of eclipse attacks on consensus.
-
#3Impossibility of Full Decentralization in Permissionless BlockchainsAnalysis of decentralization limitations in blockchain consensus protocols, focusing on Sybil costs and economic incentives across PoW, PoS, and DPoS systems.
-
#4Quantifying Blockchain Extractable Value: Security Risks and Economic ImpactComprehensive analysis of Blockchain Extractable Value (BEV) quantifying $540.54M extracted through sandwich attacks, liquidations, and arbitrage over 32 months, with security implications for blockchain consensus.
-
#5From Griefing to Stability in Blockchain Mining EconomiesAnalysis of griefing behavior in blockchain mining economies, game-theoretic models, evolutionary stability, and convergence to market equilibria via proportional response protocols.
-
#6From Grieving to Stability in Blockchain Mining Economies: A Game-Theoretic AnalysisAnalysis of grieving behavior in blockchain mining economies, evolutionary stability, and convergence to market equilibria via proportional response protocols.
-
#7Blockchain Selfish Mining: Multi-Pool Analysis and Security ImplicationsComprehensive analysis of selfish mining in blockchain with multiple misbehaving pools, Markov chain modeling, profitability thresholds, and security implications for PoW consensus.
-
#8Unstable Throughput: When the Difficulty Algorithm Breaks - Analysis of Bitcoin Cash's Mining InstabilityAnalysis of Bitcoin Cash's difficulty algorithm instability, mathematical derivation of NEFDA solution, and empirical comparison demonstrating improved transaction throughput stability.
-
#9hashratecoin - Technical Documentation and ResourcesComprehensive technical documentation and resources about hashratecoin technology and applications.
-
#10Efficient Cryptocurrency Mining Algorithm for IoT DevicesResearch on implementing portable, platform-agnostic cryptocurrency mining using Stratum protocol for resource-constrained IoT devices across multiple platforms including ESP32 and PlayStation Portable.
-
#11Mining Power Destruction Attacks in Bitcoin with Petty-Compliant PoolsAnalysis of selfish mining, bribery, and distraction attacks exploiting Bitcoin's difficulty adjustment mechanism in semi-rational mining pool environments.
-
#12HaPPY-Mine: Designing a Mining Reward Function for Blockchain DecentralizationAnalysis of HaPPY-Mine, a novel mining reward function that pegs reward value to system hashrate to promote decentralization in blockchain networks.
-
#13Multi-Factor Inception Networks for Cryptocurrency TradingAnalysis of MFIN framework for systematic cryptocurrency trading using multiple factors and deep learning techniques to optimize portfolio Sharpe ratio.
-
#14Optical Proof of Work: A CAPEX-Based Alternative to Energy-Intensive Cryptocurrency MiningAnalysis of Optical Proof of Work (oPoW), a novel cryptocurrency mining algorithm that shifts costs from electricity to hardware using silicon photonics technology.
-
#15ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksAnalysis of ADESS protocol modifications to proof-of-work blockchain systems that increase security against double-spend attacks through temporal sequencing and exponential penalties.
-
#16ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksADESS protocol modification for PoW blockchains to increase security against double-spend attacks through temporal sequence analysis and exponential penalty mechanisms.
-
#17Selfish Mining in Ethereum: Combinatorial Analysis and Strategy ComparisonAnalysis of selfish mining strategies in Ethereum, comparing profitability and impact on difficulty adjustment. Includes closed-form formulas using Dyck words combinatorics.
-
#18Undetectable Selfish Mining: Analysis of Blockchain Security VulnerabilitiesResearch paper analyzing statistically undetectable selfish mining strategies in blockchain protocols, including profitability thresholds and detection evasion techniques.
Last updated: 2025-12-12 03:35:07