N. Szabo, Formalizing and securing relationships on public networks, First Monday, vol.2, issue.9, 1997.

F. Vogelsteller and V. Buterin, Ethereum whitepaper, Ethereum Foundation, 2014.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

B. Wiki,

A. K. Goharshady, A. Behrouz, and K. Chatterjee, Secure Credit Reporting on the Blockchain, IEEE International Conference on Blockchain, pp.1343-1348, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01907905

T. Locher, S. Obermeier, and Y. A. Pignolet, When Can a Distributed Ledger Replace a Trusted Third Party?, IEEE International Conference on Blockchain, pp.1069-1077, 2018.

L. Luu, D. Chu, H. Olickel, P. Saxena, and A. Hobor, Making smart contracts smarter, ACM SIGSAC Conference on Computer and Communications Security, pp.254-269, 2016.

, Cryptocurrency Market Capitalizations

A. D. Gordon, T. A. Henzinger, A. V. Nori, and S. K. Rajamani, Probabilistic programming, Future of Software Engineering, pp.167-181, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01400890

M. Dameron, Beige paper: An Ethereum Technical Specification

B. Wiki, Transaction

A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf et al., On the security and performance of proof of work blockchains, ACM SIGSAC Conference on Computer and Communications Security, pp.3-16, 2016.

C. Cachin, Architecture of the hyperledger blockchain fabric, Workshop on Distributed Cryptocurrencies and Consensus Ledgers, 2016.

, Ethereum Foundation

Y. Hirai, Defining the ethereum virtual machine for interactive theorem provers, International Conference on Financial Cryptography and Data Security, pp.520-535, 2017.

G. Wood, Ethereum yellow paper, 2014.

S. Vajda, Probabilistic programming, 2014.

K. Chatterjee, H. Fu, and A. K. Goharshady, Termination analysis of probabilistic programs through Positivstellensatz's, International Conference on Computer Aided Verification, pp.3-22, 2016.

F. Olmedo, B. L. Kaminski, J. Katoen, and C. Matheja, Reasoning about recursive probabilistic programs, ACM/IEEE Symposium on Logic in Computer Science, pp.672-681, 2016.

K. Chatterjee, H. Fu, P. Novotný, and R. Hasheminezhad, Algorithmic analysis of qualitative and quantitative termination problems for affine probabilistic programs, ACM Transactions on Programming Languages and Systems, vol.40, issue.2, p.7, 2018.

K. Chatterjee, H. Fu, A. K. Goharshady, and N. Okati, Computational Approaches for Stochastic Shortest Path on Succinct MDPs, International Joint Conference on Artificial Intelligence, 2018.

D. Roy, V. Mansinghka, N. Goodman, and J. Tenenbaum, A stochastic programming perspective on nonparametric Bayes, Nonparametric Bayesian Workshop, Int. Conf. on Machine Learning, p.26, 2008.

G. Claret, S. K. Rajamani, A. V. Nori, A. D. Gordon, and J. Borgström, Bayesian inference using data flow analysis, Joint Meeting on Foundations of Software Engineering, pp.92-102, 2013.

A. D. Gordon, M. Aizatulin, J. Borgstrom, G. Claret, T. Graepel et al., A model-learner pattern for Bayesian reasoning, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.403-416, 2013.

A. ?cibior, Z. Ghahramani, and A. D. Gordon, Practical probabilistic programming with monads, ACM SIGPLAN Symposium on Haskell, pp.165-176, 2015.

R. Motwani and P. Raghavan, Randomized algorithms, 1995.

N. Foster, D. Kozen, K. Mamouras, M. Reitblatt, and A. Silva, Probabilistic netkat, European Symposium on Programming Languages and Systems, pp.282-309, 2016.

D. M. Kahn, Undecidable Problems for Probabilistic Network Programming, Mathematical Foundations of Computer Science, 2017.

S. Smolka, P. Kumar, N. Foster, D. Kozen, and A. Silva, Cantor meets Scott: semantic foundations for probabilistic networks, ACM SIGPLAN Symposium on Principles of Programming Languages, pp.557-571, 2017.

J. D. Hartog and E. P. De-vink, Mixing Up Nondeterminism and Probability: a preliminary report, Electronic Notes in Theoretical Computer Science, vol.22, pp.88-110, 1999.

M. Tan, W. Chuan, and J. Yik, Etherscan: The Ethereum Block Explorer

N. Atzei, M. Bartoletti, and T. Cimoli, A survey of attacks on ethereum smart contracts (sok), Principles of Security and Trust, pp.164-186, 2017.

K. Chatterjee, A. K. Goharshady, R. Ibsen-jensen, and Y. Velner, Ergodic Mean-Payoff Games for the Analysis of Attacks in CryptoCurrencies, International Conference on Concurrency Theory, 2018.

K. Chatterjee, A. K. Goharshady, and Y. Velner, Quantitative Analysis of Smart Contracts, European Symposium on Programming, pp.739-767, 2018.

Z. Nehai, P. Piriou, and F. Daumas, Model-Checking of Smart Contracts, IEEE International Conference on Blockchain, pp.980-987, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02103511

P. Tsankov, A. Dan, D. D. Cohen, A. Gervais, F. Buenzli et al., Securify: Practical Security Analysis of Smart Contracts, ACM Conference on Computer and Communications Security, 2018.

K. Chatterjee, A. K. Goharshady, and E. K. Goharshady, The Treewidth of Smart Contracts, ACM Symposium on Applied Computing, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01942005

N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic game theory, 2007.

J. Nash, Non-cooperative games, Annals of Mathematics, pp.286-295, 1951.

R. J. Aumann, Acceptable points in general cooperative n-person games, Contributions to the Theory of Games, vol.4, pp.287-324, 1959.

B. D. Bernheim, B. Peleg, and M. D. Whinston, Coalition-proof Nash equilibria I. concepts, Journal of Economic Theory, vol.42, issue.1, pp.1-12, 1987.

, Global Lottery Market, 2018.

. Quanta, Introducing Quanta-blockchain lottery protocol

, Arizton Advisory & Intelligence, Gambling Market-Global Outlook and Forecast, 2018.

W. R. Eadington, The economics of casino gambling, Journal of Economic Perspectives, vol.13, issue.3, pp.173-192, 1999.

S. Foteinis, Bitcoin's alarming carbon footprint, Nature, vol.554, issue.169, 2018.

K. J. O'dwyer and D. Malone, Bitcoin mining and its energy footprint, IET Irish Signals and Systems Conference, 2014.

Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich, Algorand: Scaling byzantine agreements for cryptocurrencies, Symposium on Operating Systems Principles, pp.51-68, 2017.

A. Kiayias, A. Russell, B. David, and R. Oliynykov, Ouroboros: A provably secure proof-of-stake blockchain protocol, Annual International Cryptology Conference, pp.357-388, 2017.

S. Dziembowski, S. Faust, V. Kolmogorov, and K. Pietrzak, Proofs of space, Annual Cryptology Conference, pp.585-605, 2015.

B. Cohen and K. Pietrzak, Simple proofs of sequential work, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.451-467, 2018.

K. Chatterjee, A. K. Goharshady, and A. Pourdamghani, Hybrid Mining: Exploiting Blockchain's Computational Power for Distributed Problem Solving, ACM Symposium on Applied Computing, 2019.

V. Zamfir, Introducing Casper, the Friendly Ghost

U. Chohan, The Decentralized Autonomous Organization and Governance Issues, 2017.

, The DAO of accrue: A new, automated investment fund has attracted stacks of digital money

A. Reutov, Predicting Random Numbers in Ethereum Smart Contracts

E. Stack-exchange, When can BLOCKHASH be safely used for a random number?

. Anonymous, Ethereum Lottery, fueled by Bitcoin blocks

O. Ltd, The random datasource-chapter 2

O. Ltd, Oraclize-Blockchain oracle service, enabling data-rich smart contracts

I. Randomness and . Services-ltd, True random number service

O. Goldreich, Foundations of cryptography, 2009.

G. Brassard, D. Chaum, and C. Crépeau, Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, vol.37, issue.2, pp.156-189, 1988.

. Anonymous, RANDAO: A DAO working as RNG of Ethereum

B. Schneier, Cryptographic design vulnerabilities, Computer, vol.31, issue.9, pp.29-33, 1998.

D. Felsch, M. Grothe, J. Schwenk, A. Czubak, and M. Szymanek, The Dangers of Key Reuse: Practical Attacks on IPsec IKE, USENIX Security Symposium, pp.567-583, 2018.

M. Vanhoef and F. Piessens, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, ACM SIGSAC Conference on Computer and Communications Security, pp.1313-1328, 2017.

N. Sastry and D. Wagner, Security considerations for IEEE 802.15.4 networks, ACM workshop on Wireless security, pp.32-42, 2004.

. Anonymous, Randao: Verifiable Random Number Generation, 2017.

, Official Go implementation of the Ethereum protocol (geth)