- #1Bitcoin Price and Mining Cost: Causality Analysis and Economic FrameworkEconomic analysis explaining why bitcoin mining costs follow price movements rather than preceding them, with technical models and future applications.
- #2Analysis of Attacks on Blockchain Consensus: Double-Spend and Eclipse AttacksEconomic evaluation of double-spend attacks in blockchain systems, analyzing transaction security, mining power requirements, and the impact of eclipse attacks on consensus.
- #3Impossibility of Full Decentralization in Permissionless BlockchainsAnalysis of decentralization limitations in blockchain consensus protocols, focusing on Sybil costs and economic incentives across PoW, PoS, and DPoS systems.
- #4Quantifying Blockchain Extractable Value: Security Risks and Economic ImpactComprehensive analysis of Blockchain Extractable Value (BEV) quantifying $540.54M extracted through sandwich attacks, liquidations, and arbitrage over 32 months, with security implications for blockchain consensus.
- #5From Griefing to Stability in Blockchain Mining EconomiesAnalysis of griefing behavior in blockchain mining economies, game-theoretic models, evolutionary stability, and convergence to market equilibria via proportional response protocols.
- #6From Grieving to Stability in Blockchain Mining Economies: A Game-Theoretic AnalysisAnalysis of grieving behavior in blockchain mining economies, evolutionary stability, and convergence to market equilibria via proportional response protocols.
- #7Blockchain Selfish Mining: Multi-Pool Analysis and Security ImplicationsComprehensive analysis of selfish mining in blockchain with multiple misbehaving pools, Markov chain modeling, profitability thresholds, and security implications for PoW consensus.
- #8Unstable Throughput: When the Difficulty Algorithm Breaks - Analysis of Bitcoin Cash's Mining InstabilityAnalysis of Bitcoin Cash's difficulty algorithm instability, mathematical derivation of NEFDA solution, and empirical comparison demonstrating improved transaction throughput stability.
- #9hashratecoin - Technical Documentation and ResourcesComprehensive technical documentation and resources about hashratecoin technology and applications.
- #10Efficient Cryptocurrency Mining Algorithm for IoT DevicesResearch on implementing portable, platform-agnostic cryptocurrency mining using Stratum protocol for resource-constrained IoT devices across multiple platforms including ESP32 and PlayStation Portable.
- #11Mining Power Destruction Attacks in Bitcoin with Petty-Compliant PoolsAnalysis of selfish mining, bribery, and distraction attacks exploiting Bitcoin's difficulty adjustment mechanism in semi-rational mining pool environments.
- #12HaPPY-Mine: Designing a Mining Reward Function for Blockchain DecentralizationAnalysis of HaPPY-Mine, a novel mining reward function that pegs reward value to system hashrate to promote decentralization in blockchain networks.
- #13Multi-Factor Inception Networks for Cryptocurrency TradingAnalysis of MFIN framework for systematic cryptocurrency trading using multiple factors and deep learning techniques to optimize portfolio Sharpe ratio.
- #14Optical Proof of Work: A CAPEX-Based Alternative to Energy-Intensive Cryptocurrency MiningAnalysis of Optical Proof of Work (oPoW), a novel cryptocurrency mining algorithm that shifts costs from electricity to hardware using silicon photonics technology.
- #15ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksAnalysis of ADESS protocol modifications to proof-of-work blockchain systems that increase security against double-spend attacks through temporal sequencing and exponential penalties.
- #16ADESS: A Proof-of-Work Protocol to Deter Double-Spend AttacksADESS protocol modification for PoW blockchains to increase security against double-spend attacks through temporal sequence analysis and exponential penalty mechanisms.
- #17Selfish Mining in Ethereum: Combinatorial Analysis and Strategy ComparisonAnalysis of selfish mining strategies in Ethereum, comparing profitability and impact on difficulty adjustment. Includes closed-form formulas using Dyck words combinatorics.
- #18Undetectable Selfish Mining: Analysis of Blockchain Security VulnerabilitiesResearch paper analyzing statistically undetectable selfish mining strategies in blockchain protocols, including profitability thresholds and detection evasion techniques.
Last updated: 2026-03-13 12:48:30