• Corpus ID: 19658247

The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining

@article{Courtois2013TheUF,
  title={The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining},
  author={Nicolas T. Courtois and Marek Grajek and Rahul Naik},
  journal={ArXiv},
  year={2013},
  volume={abs/1310.7935}
}
Bitcoin is a "crypto currency", a decentralized electronic payment scheme based on cryptography which has recently gained excessive popularity. [] Key Method We reformulate this problem as a Constrained Input Small Output (CISO) hashing problem and reduce the problem to a pure block cipher problem. We estimate the speed of this process and we show that the cost of this process is less than it seems and it depends on a certain cryptographic constant which we estimated to be at most 1.86. These optimizations…

Could Bitcoin transactions be 100x faster?

This paper looks at the question of fast transaction acceptance in bitcoin and other crypto currencies and claims that bitcoin needs to change in order to be able to satisfy the most basic needs of modern users.

On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency

This paper revisits the concept of block withholding attacks and proposes a new concrete and practical block withholding attack which is shown to maximize the advantage gained by rogue miners.

Approximate bitcoin mining

This work proposes approximate mining circuits that trade off reliability with area and delay, and shows that approximation has the potential to increase mining profits by 30%.

Rational Mining Of Bitcoin

  • Soumen PachalS. Ruj
  • Computer Science, Mathematics
    2019 11th International Conference on Communication Systems & Networks (COMSNETS)
  • 2019
This work proposes a new mining strategy called the Rational Mining, following which only 28% of miners are enough to make Bitcoin decentralized, and shows how a miner can choose a strategy to maximize its gain under different parameter selection.

On detection of bitcoin mining redirection attacks

This paper surveys the question of a 51% attacks and shows that there is a large variety of plausible attack scenarios and one particularly subversive attack scenario which depends on non-trivial internal details of the bitcoin hashing process is studied.

On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies

This paper develops a theory of Programmed Self-Destruction of crypto currencies and exhibits examples of 'alt-coins' which validate the theory and for which the process of programmed decline and rapid self-destruction has clearly already started.

A Survey on Security and Privacy Issues of Bitcoin

This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.

Bitcoin and Beyond: Exclusively Informational Monies

It seems that a dual money system, having two units with a fluctuating rate, may be obtained, to remedy some, but not all, of the ethical worries that arise when contemplating Bitcoin after hypothetically having become a dominant form of money.

Optimising the SHA256 Hashing Algorithm for Faster and More Efficient Bitcoin Mining 1

The main focus of this thesis is targeted towards optimising the SHA256 hashing algorithm specific to the Bitcoin mining protocol so that mining can be performed faster and in a more efficient manner.

Blockchains and Bitcoin: Regulatory Responses to Cryptocurrencies

This paper examines Bitcoin from a legal and regulatory perspective, answering several important questions and producing useful and semi-permanent findings into the usefulness of virtual currencies in general, blockchains as a means of mining currency, and the profundity of Bitcoin as compared with the development of block chain technologies.

References

SHOWING 1-10 OF 62 REFERENCES

Bitter to Better - How to Make Bitcoin a Better Currency

An in-depth investigation is performed to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment.

Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis

This short paper considers the concept of Multiplicative Complexity, a new important notion of complexity introduced in 2008 by Boyar and Peralta and applied to interesting optimizations for the S-box of the AES cipher, and reports on results on PRESENT and GOST, two block ciphers known for their exceptionally low hardware cost.

Algebraic Cryptanalysis of the Data Encryption Standard

It is demonstrated that in this paper, several interesting attacks on a real-life "industrial" block cipher can be found, and one of the attacks is the fastest known algebraic attack on 6 rounds of DES, which is quite interesting in itself.

What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher

A meet-in-the-middle attack that can always be successfully mounted against any practical block ciphers with success probability one is described and a suggestion about the relation between the key size and block size is given, which suggests it is better to take a key size equal to the block size.

First Analysis of Keccak

We apply known automated cryptanalytic tools to the Keccak-f [1600] permutation, using a triangulation tool to solve the CICO problem, and cube testers to detect some structure in the algebraic

Quantitative Analysis of the Full Bitcoin Transaction Graph

This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.

Majority Is Not Enough: Bitcoin Mining Is Vulnerable

The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.

On the hardware implementations of the SHA-2 (256, 384, 512) hash functions

  • N. SklavosO. Koufopavlou
  • Computer Science, Mathematics
    Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03.
  • 2003
A VLSI architecture for the SHA-2 family is proposed, which can substitute efficiently the previous SHA-1 standard implementations, in every integrity security scheme, with higher offered security level, and better performance.

Quasi-pipelined hash circuits

An optimization technique called quasi-pipelining, whose goal is to optimize the critical path and thus to increase the clock frequency in dedicated hardware implementations, is formalized.
...