Formalizing and securing relationships on public networks, First Monday, vol.2, issue.9, 1997. ,
Ethereum whitepaper, Ethereum Foundation, 2014. ,
Bitcoin: A peer-to-peer electronic cash system, 2008. ,
,
Secure Credit Reporting on the Blockchain, IEEE International Conference on Blockchain, pp.1343-1348, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01907905
When Can a Distributed Ledger Replace a Trusted Third Party?, IEEE International Conference on Blockchain, pp.1069-1077, 2018. ,
Making smart contracts smarter, ACM SIGSAC Conference on Computer and Communications Security, pp.254-269, 2016. ,
, Cryptocurrency Market Capitalizations
Probabilistic programming, Future of Software Engineering, pp.167-181, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01400890
Beige paper: An Ethereum Technical Specification ,
Transaction ,
On the security and performance of proof of work blockchains, ACM SIGSAC Conference on Computer and Communications Security, pp.3-16, 2016. ,
Architecture of the hyperledger blockchain fabric, Workshop on Distributed Cryptocurrencies and Consensus Ledgers, 2016. ,
, Ethereum Foundation
Defining the ethereum virtual machine for interactive theorem provers, International Conference on Financial Cryptography and Data Security, pp.520-535, 2017. ,
Ethereum yellow paper, 2014. ,
Probabilistic programming, 2014. ,
Termination analysis of probabilistic programs through Positivstellensatz's, International Conference on Computer Aided Verification, pp.3-22, 2016. ,
Reasoning about recursive probabilistic programs, ACM/IEEE Symposium on Logic in Computer Science, pp.672-681, 2016. ,
Algorithmic analysis of qualitative and quantitative termination problems for affine probabilistic programs, ACM Transactions on Programming Languages and Systems, vol.40, issue.2, p.7, 2018. ,
Computational Approaches for Stochastic Shortest Path on Succinct MDPs, International Joint Conference on Artificial Intelligence, 2018. ,
A stochastic programming perspective on nonparametric Bayes, Nonparametric Bayesian Workshop, Int. Conf. on Machine Learning, p.26, 2008. ,
Bayesian inference using data flow analysis, Joint Meeting on Foundations of Software Engineering, pp.92-102, 2013. ,
A model-learner pattern for Bayesian reasoning, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.403-416, 2013. ,
Practical probabilistic programming with monads, ACM SIGPLAN Symposium on Haskell, pp.165-176, 2015. ,
, Randomized algorithms, 1995.
Probabilistic netkat, European Symposium on Programming Languages and Systems, pp.282-309, 2016. ,
Undecidable Problems for Probabilistic Network Programming, Mathematical Foundations of Computer Science, 2017. ,
Cantor meets Scott: semantic foundations for probabilistic networks, ACM SIGPLAN Symposium on Principles of Programming Languages, pp.557-571, 2017. ,
Mixing Up Nondeterminism and Probability: a preliminary report, Electronic Notes in Theoretical Computer Science, vol.22, pp.88-110, 1999. ,
Etherscan: The Ethereum Block Explorer ,
A survey of attacks on ethereum smart contracts (sok), Principles of Security and Trust, pp.164-186, 2017. ,
Ergodic Mean-Payoff Games for the Analysis of Attacks in CryptoCurrencies, International Conference on Concurrency Theory, 2018. ,
Quantitative Analysis of Smart Contracts, European Symposium on Programming, pp.739-767, 2018. ,
Model-Checking of Smart Contracts, IEEE International Conference on Blockchain, pp.980-987, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02103511
Securify: Practical Security Analysis of Smart Contracts, ACM Conference on Computer and Communications Security, 2018. ,
The Treewidth of Smart Contracts, ACM Symposium on Applied Computing, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01942005
, Algorithmic game theory, 2007.
Non-cooperative games, Annals of Mathematics, pp.286-295, 1951. ,
Acceptable points in general cooperative n-person games, Contributions to the Theory of Games, vol.4, pp.287-324, 1959. ,
Coalition-proof Nash equilibria I. concepts, Journal of Economic Theory, vol.42, issue.1, pp.1-12, 1987. ,
, Global Lottery Market, 2018.
Introducing Quanta-blockchain lottery protocol ,
, Arizton Advisory & Intelligence, Gambling Market-Global Outlook and Forecast, 2018.
The economics of casino gambling, Journal of Economic Perspectives, vol.13, issue.3, pp.173-192, 1999. ,
Bitcoin's alarming carbon footprint, Nature, vol.554, issue.169, 2018. ,
Bitcoin mining and its energy footprint, IET Irish Signals and Systems Conference, 2014. ,
Algorand: Scaling byzantine agreements for cryptocurrencies, Symposium on Operating Systems Principles, pp.51-68, 2017. ,
Ouroboros: A provably secure proof-of-stake blockchain protocol, Annual International Cryptology Conference, pp.357-388, 2017. ,
Proofs of space, Annual Cryptology Conference, pp.585-605, 2015. ,
Simple proofs of sequential work, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.451-467, 2018. ,
Hybrid Mining: Exploiting Blockchain's Computational Power for Distributed Problem Solving, ACM Symposium on Applied Computing, 2019. ,
Introducing Casper, the Friendly Ghost ,
The Decentralized Autonomous Organization and Governance Issues, 2017. ,
, The DAO of accrue: A new, automated investment fund has attracted stacks of digital money
Predicting Random Numbers in Ethereum Smart Contracts ,
When can BLOCKHASH be safely used for a random number? ,
Ethereum Lottery, fueled by Bitcoin blocks ,
The random datasource-chapter 2 ,
Oraclize-Blockchain oracle service, enabling data-rich smart contracts ,
True random number service ,
, Foundations of cryptography, 2009.
Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, vol.37, issue.2, pp.156-189, 1988. ,
RANDAO: A DAO working as RNG of Ethereum ,
Cryptographic design vulnerabilities, Computer, vol.31, issue.9, pp.29-33, 1998. ,
The Dangers of Key Reuse: Practical Attacks on IPsec IKE, USENIX Security Symposium, pp.567-583, 2018. ,
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, ACM SIGSAC Conference on Computer and Communications Security, pp.1313-1328, 2017. ,
Security considerations for IEEE 802.15.4 networks, ACM workshop on Wireless security, pp.32-42, 2004. ,
Randao: Verifiable Random Number Generation, 2017. ,
, Official Go implementation of the Ethereum protocol (geth)