ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1912.02954
  4. Cited By
Selfish Behavior in the Tezos Proof-of-Stake Protocol

Selfish Behavior in the Tezos Proof-of-Stake Protocol

6 December 2019
M. Neuder
Daniel J. Moroz
Rithvik Rao
David C. Parkes
ArXivPDFHTML

Papers citing "Selfish Behavior in the Tezos Proof-of-Stake Protocol"

13 / 13 papers shown
Title
Timestamp Manipulation: Timestamp-based Nakamoto-style Blockchains are Vulnerable
Timestamp Manipulation: Timestamp-based Nakamoto-style Blockchains are Vulnerable
Junjie Hu
Na Ruan
Sisi Duan
62
0
0
08 May 2025
Selfish mining under general stochastic rewards
Selfish mining under general stochastic rewards
Maryam Bahrani
Michael Neuder
S. M. Weinberg
74
0
0
27 Feb 2025
How to Rationally Select Your Delegatee in PoS
How to Rationally Select Your Delegatee in PoS
Yuzhe Zhang
Qin Wang
Shiping Chen
Chen Wang
40
5
0
13 Oct 2023
Undetectable Selfish Mining
Undetectable Selfish Mining
Maryam Bahrani
S. M. Weinberg
16
4
0
13 Sep 2023
Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains
Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains
A. Jain
Sujit Gujar
K. Srinathan
16
0
0
21 Sep 2022
Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work
  Mining
Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining
Sheng-Nan Li
Carlo Campajola
Claudio J. Tessone
25
6
0
11 Aug 2022
The security of the Coordicide: the implementation and analysis of
  possible attack vectors
The security of the Coordicide: the implementation and analysis of possible attack vectors
Daria Dziubałtowska
38
2
0
25 May 2022
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and
  Consensus Security
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security
Yulin Liu
Yuxuan Lu
Kartik Nayak
Fan Zhang
Luyao Zhang
Yinhong Zhao
54
83
0
14 Jan 2022
Proof-of-Stake Mining Games with Perfect Randomness
Proof-of-Stake Mining Games with Perfect Randomness
Matheus V. X. Ferreira
S. M. Weinberg
36
19
0
08 Jul 2021
Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders
Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders
M. Neuder
Daniel J. Moroz
Rithvik Rao
David C. Parkes
AAML
15
34
0
03 Feb 2021
Defending Against Malicious Reorgs in Tezos Proof-of-Stake
Defending Against Malicious Reorgs in Tezos Proof-of-Stake
M. Neuder
Daniel J. Moroz
Rithvik Rao
David C. Parkes
AAML
31
12
0
11 Sep 2020
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms
  with Deep Reinforcement Learning
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
Charlie Hou
Mingxun Zhou
Yan Ji
Philip Daian
Florian Tramèr
Giulia Fanti
Ari Juels
AAML
29
30
0
04 Dec 2019
Competitive equilibria between staking and on-chain lending
Competitive equilibria between staking and on-chain lending
Tarun Chitra
AAML
24
23
0
28 Nov 2019
1