44
4

Satoshi Risk Tables

Abstract

We present Bitcoin Security Tables computing the probability of success p(z,q,t) of a double spend attack by an attacker controlling a share q of the hashrate after z confirmations in time t.

View on arXiv
Comments on this paper