10.02.2016 Views

Bitcoin and Cryptocurrency Technologies

1Qqc4BN

1Qqc4BN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Further reading<br />

An excellent paper on the evolution of mining hardware:<br />

Taylor, Michael Bedford. ​<strong>Bitcoin</strong> <strong>and</strong> the age of bespoke Silicon​. Proceedings of the 2013<br />

International Conference on Compilers, Architectures <strong>and</strong> Synthesis for Embedded Systems. IEEE<br />

Press, 2013.<br />

A paper discussing some aspects of running a <strong>Bitcoin</strong> mining center including cooling costs:<br />

Kampl, Alex. ​Analysis of Large‐Scale <strong>Bitcoin</strong> Mining Operations​. White paper, Allied Control, 2014.<br />

The “systematization of knowledge” paper on <strong>Bitcoin</strong> <strong>and</strong> cryptocurrencies, especially Section III on<br />

Stability:<br />

Bonneau, Joseph, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, <strong>and</strong> Edward W.<br />

Felten. ​Research Perspectives <strong>and</strong> Challenges for <strong>Bitcoin</strong> <strong>and</strong> Cryptocurrencies​. Proceedings of 2015<br />

IEEE Security <strong>and</strong> Privacy Conference, 2015.<br />

A comprehensive 2011 paper analyzing different reward systems for pooled mining (some of the<br />

information is a bit out of date, but overall it’s still a good resource):<br />

Rosenfeld, Meni. ​Analysis of bitcoin pooled mining reward systems​. arXiv preprint arXiv:1112.4980<br />

(2011).<br />

Several papers that analyze mining strategy:<br />

Eyal, Ittay, <strong>and</strong> Emin Gün Sirer. ​Majority is not enough: <strong>Bitcoin</strong> mining is vulnerable​. Financial<br />

Cryptography <strong>and</strong> Data Security. Springer Berlin Heidelberg, 2014.<br />

Kroll, Joshua A., Ian C. Davey, <strong>and</strong> Edward W. Felten. ​The economics of <strong>Bitcoin</strong> mining, or <strong>Bitcoin</strong> in<br />

the presence of adversaries​. Proceedings of WEIS. Vol. 2013.<br />

Eyal, Ittay. ​The Miner's Dilemma​. Proceedings of 2015 IEEE Security <strong>and</strong> Privacy Conference, 2015.<br />

164

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!