On bitcoin and red balloons, Proceedings of the 13th ACM conference on electronic commerce, pp.56-73, 2012. ,
DOI : 10.1145/2229012.2229022
URL : http://www.cs.huji.ac.il/~avivz/pubs/12/Bitcoin_EC0212.pdf
On the Instability of Bitcoin Without the Block Reward, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.154-167, 2016. ,
DOI : 10.1007/978-3-662-44774-1_5
Ergodic Theory and Dynamical Systems, pp.978-979, 2016. ,
DOI : 10.1007/978-1-4471-7287-1
The Miner's Dilemma, 2015 IEEE Symposium on Security and Privacy, pp.89-103, 2015. ,
DOI : 10.1109/SP.2015.13
Bitcoin-ng: A scalable blockchain protocol, pp.45-59, 2016. ,
Majority Is Not Enough: Bitcoin Mining Is Vulnerable, International Conference on Financial Cryptography and Data Security, pp.436-454, 2014. ,
DOI : 10.1007/978-3-662-45472-5_28
URL : http://www.cs.cornell.edu/~ie53/publications/btcProcArXiv.pdf
The Bitcoin Backbone Protocol: Analysis and Applications, pp.281-310978, 2015. ,
DOI : 10.1007/978-3-662-46803-6_10
Bitcoin blockchain??dynamics: The selfish-mine strategy in the presence of propagation delay, Performance Evaluation, vol.104, pp.23-41, 2016. ,
DOI : 10.1016/j.peva.2016.07.001
Inclusive Block Chain Protocols, International Conference on Financial Cryptography and Data Security, pp.528-547, 2015. ,
DOI : 10.1007/978-3-662-47854-7_33
URL : http://www.cs.huji.ac.il/%7Eavivz/pubs/15/inclusive_btc.pdf
Towards fairness of cryptocurrency payments. arXiv preprint arXiv:1609, p.7256, 2016. ,
A Digital Signature Based on a Conventional Encryption Function, pp.369-378, 1988. ,
DOI : 10.1007/3-540-48184-2_32
Bitcoin: A peer-to-peer electronic cash system, 2018. ,
Analysis of the Blockchain Protocol in Asynchronous Networks, IACR Cryptology ePrint Archive, vol.27, issue.2, p.454, 2016. ,
DOI : 10.1145/383059.383071
FruitChains, Proceedings of the ACM Symposium on Principles of Distributed Computing , PODC '17, 2016. ,
DOI : 10.1007/978-3-319-56614-6_22
Choices, The Journal of Urology, vol.176, issue.6, 1987. ,
DOI : 10.1016/j.juro.2006.08.124
Artificial Intelligence -A Modern Approach (3. internat, 2010. ,
Optimal Selfish Mining Strategies in Bitcoin, International Conference on Financial Cryptography and Data Security, pp.515-532, 2016. ,
DOI : 10.1007/978-3-662-47854-7_32
URL : http://arxiv.org/pdf/1507.06183
Conceptual Foundations of Risk Theory Technical bulletin (United States, Department of Agriculture), U.S. Department of Agriculture, 1987. ,