Category | Full Reference | * |
---|---|---|
Web Resources | BlockScience. “Introducing Neural Quorum Governance. A Comprehensive Framework for Assigning Voting Power and Managing Voter Attention for the Stellar Community Fund.” BlockScience Blog.·Nov 9 2023. medium.com/block-science/introducing-neural-quorum-governance-e31dda71e81c | |
Web Resources | Bryan, Dick. Lee, Benjamin. Wosnitzer, Robert. Virtanen, Akseli. “Economics back into Cryptoeconomics.” Econaut. Sep 11, 2018: https://medium.com/econaut/economics-back-into-cryptoeconomics-20471f5ceeea | |
Web Resources | Buterin, Vitalik. “Introduction to Cryptoeconomics.” Ethereum Foundation. https://www.youtube.com/watch?v=pKqdjaH1dRo. 2017 | |
Web Resources | Buterin, Vitalik. “The Meaning of Decentralization.” https://medium.com/@VitalikButerin/the-meaningof-decentralization-a0c92b76a274. | |
Web Resources | Cointelegraph. “Deutsche BaFin: Compliance-Untersuchung bei UniswapDie BaFin leitet eine Untersuchung gegen die Kryptoplattform Uniswap ein, weil sie ihre Kunden aufgefordert haben soll, ihre neue Wallet herunterzuladen.” 21 MAR 2023https://de.cointelegraph.com/news/the-german-federal-financial-supervisory-authority-bafin-opens-an-investigation-against-uniswap | |
Web Resources | Finestone, Matthew. “Game Theory and Blockchain”. Medium. Jan 06, 2018. Accessed before May 2020. https://matthewfinestone.medium.com/game-theory-and-blockchain-db46e67933d7 | |
Web Resources | McConaghy, Trent. “Can Blockchains Go Rogue?”. Ocean Protocol Blog. Feb 27, 2018. Accessed before May 2020. https://blog.oceanprotocol.com/can-blockchains-go-rogue-5134300ce790 | |
Web Resources | McConaghy, Trent. “Nature 2.0”. Ocean Protocol Blog. Jun 06, 2018. Accessed before May 2020. https://blog.oceanprotocol.com/nature-2-0-27bdf8238071 | |
Web Resources | McConaghy, Trent. “Towards a Practice of Token Engineering”. Ocean Protocol Blog. Mar 01, 2018. Accessed before May 2020. https://blog.oceanprotocol.com/towards-a-practice-of-token-engineering-b02feeeff7ca | |
Web Resources | Paruch, Krzysztof. “Token Engineering from an Economic Perspective”. Crypto3conomics Blog. Nov 06, 2018. Accessed before May 2020. https://medium.com/crypto3conomics/token-engineering-from-an-economic-perspective-b6c464f20241 | |
Web Resources | Rice, Charles; Zargham, Michael. “On the Practice of Token Engineering, Part 1: Enter the Token Engineer”. BlockScience Blog. Feb 11, 2019. Accessed before May 2020. https://medium.com/block-science/on-the-practice-of-token-engineering-part-i-c2cc2434e727 | |
Web Resources | Tapson, Mark. “The Soft Totalitarianism of Nudging: The Left’s new social engineering tool to steer Americans toward making the ‘correct’ choices”. Front Page Magazine. Aug 13, 2013. Accessed before May 2020. https://www.frontpagemag.com/soft-totalitarianism-nudging-mark-tapson/ | |
Web Resources | Tomaino, Nick. “Cryptoeconomics 101.” The Cntrol. 2017. https://thecontrol.co/cryptoeconomics-101-e5c883e9a8ff. | |
Web Resources | Verbin, Elad. Comment on: “Towards a Practice of Token Engineering” by McConaghy, Trent. Medium. Mar 05, 2018. Accessed before May 2020. https://elad-verbin.medium.com/i-feel-the-right-kind-of-engineering-expertise-that-youre-looking-for-is-actually-public-policy-78fb28a698bb | |
Web Resources | Voshmgir, Shermin. “Blockchain & Sustainability”. Crypto3conomics Blog. Aug 11, 2018. Accessed before May 2020. https://medium.com/crypto3conomics/blockchain-sustainability-7d1dd90e9db6 | |
Web Resources | Voshmgir, Shermin. “Purpose-Driven Tokens”. Token Kitchen Blog. Apr 11, 2019. Accessed before May 2020. https://medium.com/token-kitchen/purpose-driven-tokens-51334d278c32 | |
Web Resources | Voshmgir, Shermin. “Token Engineering Research”. Crypto3conomics Blog. Nov 06, 2018. Accessed before May 2020. https://medium.com/crypto3conomics/token-engineering-research-b6627add09ee | |
Web Resources | Wei, Bai. “Mechanism Design in Cryptoeconomics”. SECBIT Media Blog. May 31, 2018. Accessed before May 2020. https://medium.com/secbit-media/mechanism-design-in-cryptoeconomics-6630673b79af | |
Web Resources | Wikipedia contributors, 'Plutocracy', Wikipedia, The Free Encyclopedia, 23 October 2023, 23:17 UTC, <https://en.wikipedia.org/w/index.php?title=Plutocracy&oldid=1181582624> [accessed 13 November 2023] | |
Web Resources | Wikipedia contributors, "Game theory," Wikipedia, The Free Encyclopedia, https://en.wikipedia.org/w/index.php?title=Game_theory&oldid=1194465131 (accessed January 16, 2019). | |
Web Resources | Wikipedia contributors, "Quadratic voting," Wikipedia, The Free Encyclopedia, https://en.wikipedia.org/w/index.php?title=Quadratic_voting&oldid=1172168630 (accessed November 13, 2023). | |
Web Resources | Wikipedia Contributors. “Behavioral economics”. Wikipedia. Feb 08, 2020. Accessed Dec 01, 2020. https://en.wikipedia.org/w/index.php?title=Behavioral_economics&oldid=939800984 | |
Web Resources | Wikipedia Contributors. “Behavioral game theory”. Wikipedia. Jan 15, 2020. Accessed Dec 01, 2020. https://en.wikipedia.org/w/index.php?title=Behavioral_game_theory&oldid=935922120 | |
Web Resources | Wikipedia Contributors. “Externality”. Wikipedia. Feb 06, 2020. Accessed Jan 18, 2020. https://en.wikipedia.org/w/index.php?title=Externality&oldid=939366287 | |
Web Resources | Wikipedia Contributors. “Nudge theory”. Wikipedia. Jan 12, 2020. Accessed Jan 18, 2020. https://en.wikipedia.org/w/index.php?title=Nudge_theory&oldid=935454086 | |
Web Resources | Wikipedia Contributors. “Private good”. Wikipedia. Jan 25, 2020. Accessed Jan 18, 2021. https://en.wikipedia.org/w/index.php?title=Private_good&oldid=937503748 | |
Web Resources | Zamfir, Vlad. “What is Cryptoeconomics.” Presentation at CryptEconomicon 2015. Crypto Technology Conference, Mountain View CA, 26-29 January. | |
Web Resources | Zargham, Michael. “A Brief History of Conviction Voting.” BlockScience Blog. 26, 2020 medium.com/block-science/a-brief-history-of-conviction-voting-ad4ca4eb4aee | |
Web Resources | Zargham, Michael. “Token Engineering 101: Why Engineering is Necessary”. BlockScience Blog. Jul 01, 2018. Accessed before May 2020. https://medium.com/block-science/token-engineering-101-why-engineering-is-necessary-3bac27ccb8b7 | |
Books | Bolton, Patrick, Mathias Dewatripont, et al. 2005. Contract theory. MIT press. | |
Books | Easley, D., and J. Kleinberg. 2010. Networks, Crowds, and Markets. Vol. 8, Cambridge University Press. | |
Books | Gigerenzer, Gerd; Selten, Reinhard. Bounded Rationality: The Adaptive Toolbox. MIT Press, 2002 | |
Books | Hess, Charlotte; Ostrom, Elinor. Understanding Knowledge as a Commons: From Theory to Practice. Cambridge: MIT, 2007, pp. 12-13. | |
Books | Hurwicz, L., and S. Reiter. 2006. Designing Economic Mechanisms. Cambridge University Press. | |
Books | Jackson, M.O. 2008. Social and Economic Networks. Princeton University Press. | |
Books | Kazdin, Alan E. Behavior Modification in Applied Settings. The Dorsey Press Homewood, 1975 | |
Books | Kazdin, Alan E. The Token Economy. A review and evaluation. Plenum Press, 1977 | |
Books | Laffont, Jean-Jacques, and David Martimort. 2009. The theory of incentives: the principal-agent model. Princeton university press. | |
Books | Loukides, Mike. Manson, Hilary. Patil, DJ. 2018. “Ethics and Data Science.” O’Reilly Media. | |
Books | Nicholson, Walter; Snyder, Christopher M. Intermediate Microeconomics And Its Application. South-Western, 2004 | |
Books | Ostrom, Elinor. Understanding Institutional Diversity. NJ: Princeton University Press, 2005 | |
Books | Peters, Ole, and Alexander Adamou. Peters, Ole, and Alexander Adamou. 2019. “An evolutionary advantage of cooperation.”. “An evolutionary advantage of cooperation.” | |
Books | Salanie, Bernard. 2005. The economics of contracts: a primer. MIT press. | |
Books | Thaler, Richard H.; Sunstein, Cass R. Nudge: Improving Decisions about Health, Wealth, and Happiness. Yale University Press, 2008 | |
Papers | Adaptive Governance for Blockchain Networkshttps://stanford-jblp.pubpub.org/27 Pages Posted: 13 Jul 2023 Last revised: 22 Sep 2023Esen EsenerUniversité Paris II- Panthéon- Assas ; CERSA/CNRSDate Written: May 8, 2023papers.: ssrn.com/sol3/papers.cfm?abstract_id=4500961 | |
Papers | Aggarwal, Raj. “Animal spirits in financial economics: A review of deviations from economic rationality”. International Review of Financial Analysis Volume 32, Issue 1 (2014): pp. 179-187. https://doi.org/10.1016/j.irfa.2013.07.018 | |
Papers | Axelrod, Robert, and William D Hamilton. 1981. “The evolution of cooperation.” Science, 211(4489): 1390– 1396. | |
Papers | Axelrod, Robert. 1997. The complexity of cooperation: Agent-based models of competition and collaboration. Vol. 3, Princeton University Press. | |
Papers | Baheti, Radhakisan, and Helen Gill. 2011. “Cyber-physical systems.” The impact of control technology, 12(1): 161–166. | |
Papers | Camerer, Colin F. ”Progress in Behavioral Game Theory”. Journal of Economic Perspectives Volume 11, Issue 4 (1997): pp. 167-188. https://resolver.caltech.edu/CaltechAUTHORS:20110211-074641387 | |
Papers | Camerer, Colin F.; Ho, Teck-Hua. “Violations of the betweenness axiom and nonlinearity in probability”. Journal of Risk and Uncertainty Volume 8 (1994): pp. 167-196. https://doi.org/10.1007/BF01065371 | |
Papers | Catalini, Christian, and Joshua S Gans. 2016. “Some simple economics of the blockchain.” National Bureau of Economic Research. https://www.nber.org/system/files/working_papers/w22952/w22952.pdf | |
Papers | Cioffi-Revilla, Claudio. 2016. “Bigger Computational Social Science: Data, Theories, Models, and Simulations– Not Just Big Data.” Theories, Models, and Simulations–Not Just Big Data. | |
Papers | Deutsche Industrie Norm. “DIN SPEC 4997:2020-04. Privacy by Blockchain Design: A standardised model for processing personal data using blockchain technology. April 2020. www.beuth.de/en/technical-rule/din-spec-4997/321277504 | |
Papers | Eyal, Ittay. 2015. “The miner’s dilemma.” IEEE Symposium on Security and Privacy | |
Papers | Filcheck, Holly A.; McNeil, Cheryl B. “The use of token economies in preschool classrooms: practical and philosophical concerns”. Journal of Early and Intensive Behavior Intervention Volume 1, Issue 1 (2004): pp. 94-104. https://doi.org/10.1037/h0100281 | |
Papers | Grafstein, Robert. “Rationality as Conditional Expected Utility Maximization”. Journal of Political Economy and Political Psychology Volume 16, Issue 1 (1995): pp. 63-80. https://doi.org/10.2307/3791450 | |
Papers | Green, Ben, and Salome Viljoen. 2020. “Algorithmic Realism: Expanding the Boundaries of Algorithmic Thought.” FAT* ’20, 19–31. New York, NY, USA:Association for Computing Machinery. | |
Papers | Grossman, Sanford J., and Oliver D. Hart. 1981. “Implicit Contracts, Moral Hazard, and Unemployment.” The American Economic Review, 71(2): 301–307. | |
Papers | Hallgren, Martyne M.; McAdams, Alan K. “A Model for Efficient Aggregation of Resources for Economic Public Goods on the Internet”. The Journal of Electronic Publishing Volume 1, Issue 1&2 (1995): https://doi.org/10.3998/3336451.0001.125 | |
Papers | Hamilton, Walter. 1919. “The Institutional Approach to Economic Theory.” American Economic Review, , (9): 309–318. | |
Papers | Hart, Oliver, and Bengt Holmstrom. 1987. “The theory of contracts.” Advances in Economic Theory: Fifth World Congress, ed. Truman Fassett, Editor Bewley Econometric Society Monographs, 71–156. Cambridge University Press | |
Papers | Hart, Oliver, and John Moore. 1988. “Incomplete contracts and renegotiation.” Econometrica: Journal of the Econometric Society, 755–785. | |
Papers | Heidari, Hoda, Claudio Ferrari, Krishna Gummadi, and Andreas Krause. 2018. “Fairness behind a veil of ignorance: A welfare analysis for automated decision making.” 1265–1276. | |
Papers | Holmstrom, Bengt, and Paul Milgrom. 1991. “Multitask principal-agent analyses: Incentive contracts, asset ownership, and job design.” JL Econ. & Org., 7: 24. | |
Papers | Hurwicz, Leonid. 1960. “Optimality and informational efficiency in resource allocation processes.” In Mathematical Methods in the Social Sciences. , ed. K.J. Arrow, S. Karlin and P. Suppes. Stanford University Press. | |
Papers | Hurwicz, Leonid. 1972. “On informationally decentralized systems.” Decision and organization: A volume in Honor of J. Marschak. | |
Papers | Johnson, Neil, and Thomas Lux. 2011. “Financial systems: Ecology and economics.” Nature, 469(7330): 302. | |
Papers | Jordan, Michael I, and Tom M Mitchell. 2015. “Machine learning: Trends, perspectives, and prospects.” Science, 349(6245): 255–260. | |
Papers | Kahneman, Daniel, Jack L Knetsch, and Richard H Thaler. 1986. “Fairness and the assumptions of economics.” Journal of business, S285–S300. | |
Papers | Kazdin, Alan E. “The token economy: a decade later”. Journal of Applied Behavior Analysis Volume 15, Issue 3 (1982): pp. 431-445. 10.1901/jaba.1982.15-431 | |
Papers | Malkin, Jesse; Wildavsky, Aaron. “Why the Traditional Distinction between Public and Private Goods Should be Abandoned”. Journal of Theoretical Politics Volume 3, Issue 4 (1991): pp. 355-378. https://journals.sagepub.com/doi/10.1177/0951692891003004001 | |
Papers | McFadden, Daniel. “The human side of mechanism design: a tribute to Leo Hurwicz and Jean-Jacque Laffont”. Review of Economic Design Volume 13 (2009): pp. 77-100. https://link.springer.com/article/10.1007/s10058-009-0075-x | |
Papers | Mullainathan, Sendhil, and Jann Spiess. 2017. “Machine learning: an applied econometric approach.” Journal of Economic Perspectives, 31(2): 87–106. | |
Papers | Nowak, Martin A. 2006. “Five rules for the evolution of cooperation.” science, 314(5805): 1560–1563 | |
Papers | Okada, Isamu, Hitoshi Yamamoto, Fujio Toriumi, and Tatsuya Sasaki. 2015. “The Effect of Incentives and Meta-incentives on the Evolution of Cooperation.” PLOS Computational Biology, 11(5): 1–17. | |
Papers | Orlikowski, Wanda, and Susan V Scott. 2015. “The algorithm and the crowd: Considering the materiality of service innovation.” https:// dspace.mit.edu/ handle/ 1721.1/ 96870. | |
Papers | Ostrom, Elinor; Walker, James; Gardner, Roy. “Covenants With and Without a Sword: Self-Governance is Possible”. The American Political Science Review Volume 86, Issue 2 (1992): pp. 404-417. https://doi.org/10.2307/1964229 | |
Papers | Pugh, E. W. 2009. “Creating the IEEE Code of Ethics.” 1–13. | |
Papers | Rapoport, Anatol, Albert M Chammah, and Carol J Orwant. 1965. Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165, University of Michigan press | |
Papers | Rawls, John. 1958. “Justice as fairness.” The philosophical review, 67(2): 164–194. | |
Papers | Rochet, Jean-Charles, and Jean Tirole. 2003. “Platform competition in two-sided markets.” Journal of the european economic association, 1(4): 990–1029. | |
Papers | Shafir, Eldar; Tversky, Amos. “Thinking through uncertainty: Nonconsequential reasoning and choice”. Journal of Cognitive Psychology Volume 24, Issue 4 (1992): pp. 449-474. https://doi.org/10.1016/0010-0285(92)90015-T | |
Papers | Sudgen, Robert. “Do people really want to be nudged towards healthy lifestyles?”. International Review of Economics Volume 64 (2017): pp. 113-123. https://doi.org/10.1007/s12232-016-0264-1 | |
Papers | Sunstein, Cass R. “Nudging and Choice Architecture: Ethical Considerations”. Discussion Paper 809, Harvard Law School Cambridge, MA 02138 (2015). http://www.law.harvard.edu/programs/olin_center/papers/pdf/Sunstein_809.pdf | |
Papers | Thaler, Richard H.; Sunstein, Cass R.; Balz, John P. “Choice Architecture”. The Behavioral Foundations of Public Policy, Chapter 25 (2012). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2536504 | |
Papers | UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA Case 3:22-cv-00618-BEN-DEB Document 1 Filed 05/02/22 PageID.1 Page 1 of 23 www.classaction.org/media/sarcuni-et-al-v-bzx-dao-et-al.pdf | |
Papers | Voshmgir, Shermin; Zargham, Michael. “Foundations of Cryptoeconomic Systems”. Cryptoeconomics Systems Journal (2020): https://assets.pubpub.org/sy02t720/31581340240758.pdf | |
Papers | Voshmgir, Shermin. 2019. What is Token Economy? Vol. 1, O’Reilly Media, Inc. | |
Papers | Wilk, James. “Mind, Nature and the Emerging Science of Change: An Introduction to Metamorphology”. In: Metadebates on Science Volume 6 (1999): pp. 71-87. https://doi.org/10.1007/978-94-017-2245-2_6 | |
Papers | Yamamoto, Hitoshi, Isamu Okada, Satoshi Uchida, and Tatsuya Sasaki. 2017. “A norm knockout method on indirect reciprocity to reveal indispensable norms.” Scientific reports, 7: 44146. | |
Papers | Zargham, Michael; Bulkin, Aleksandr; Nelson, Scott J. Raising social capital: Tokenizing a customer-driven business”. Sweetbridge Technical White Paper Series Volume 2 (2017): https://sweetbridge.com/wp-content/uploads/2021/07/WP-Sweetbridge-Discount-Tokens.pdf | |
Papers | Zargham, Michael; Zhang, Zixuan; Preciado, Victor. “A State-Space Modeling Framework for Engineering Blockchain-Enabled Economic Systems”. ArXiv (2018): http://arxiv.org/abs/1807.00955 | |
Papers | Zlomke, Kim; Leland, Zlomke. “Token Economy Plus Self - Monitoring to Reduce Disruptive Classroom Behaviors”. The Behavior Analyst Today Volume 4, Issue 2 (2003): pp. 177-182. 10.1037/h0100117 | |
Project | Akasha: https://akasha.world | |
Project | ||
Project | Bit Seeds: https://web.archive.org/web/20190602123742/http://bitseeds.org/ | |
Project | Changers: http://changers.com | |
Project | E-chat: https://web.archive.org/web/20180203081300/https://investors.echat.io/ | |
Project | Earth Dollar: https://earthdollar.org/home/ | |
Project | Earth Token: https://earth-token.com/ | |
Project | Eco Coin: https://www.ecocoin.com/ | |
Project | Electric Chain: http://www.electricchain.org/ | |
Project | Electron: https://web.archive.org/web/20220323233236/https://electron.net/ | |
Project | Energi Mine: https://energimine.com/ | |
Project | Fireblocks: https://www.fireblocks.com/ | |
Project | Golos: https://golos.io/ | |
Project | Kleros: https://kleros.io | |
Project | Minds: https://www.minds.com/ | |
Project | Plastic Bank: https://www.plasticbank.org/ | |
Project | Recycle To Coin: https://iywto.com/things/recycle-cans/recycle-to-coin | |
Project | Solar Coin: https://solarcoin.org/ | |
Project | Sun Exchange: ttp://www.thesunexchange.com/ | |
Project | Sweatcoin: https://sweatco.in/ |
Category | Full Reference | * |
---|---|---|
Web Resources | Antsstyle. “Web3: A terrible idea that is ignorant of history and technology”. Medium. Jan 03, 2022. Accessed between October 2022 and February 2023. https://medium.com/@antsstyle/web3-a-terrible-idea-that-is-ignorant-of-history-and-technology-92398ee66c3f | |
Web Resources | Bitcoin Wiki Contributors. “B-Money”. Bitcoin Wiki. Jan 29, 2016. Accessed Jan 09, 2019. https://en.bitcoin.it/w/index.php?title=B-money&oldid=60249 | |
Web Resources | Bitcoin Wiki Contributors. “B-money”. Jun 29, 2022. Accessed between October 2022 and February 2023. https://en.bitcoin.it/w/index.php?title=B-money&oldid=69350 | |
Web Resources | Buterin, Vitalik. “Bitcoin is not quantum-safe, and how we can fix it when needed”. Bitcoin Magazine. Jul 30, 2013. Accessed before May 2020. https://bitcoinmagazine.com/technical/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150 | |
Web Resources | Buterin, Vitalik. “Privacy on the Blockchain”. Ethereum Foundation Blog. Jan 15, 2016. Accessed before May 2020. https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain | |
Web Resources | GitHub. “Bitcoin Core”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin/bitcoin | |
Web Resources | GitHub. “Bitcoin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin | |
Web Resources | GitHub. “Introduction to Mimblewimble and Grin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/mimblewimble/grin/blob/master/doc/intro.md | |
Web Resources | Heilman, Ethan; Narula, Neha; Dryja, Thaddeus; Virza, Madars. “IOTA Vulnerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency”. Github. Sep 07, 2017. Accessed before May 2020. https://github.com/mit-dci/tangled-curl/blob/master/vuln-iota.md | |
Web Resources | Hughes, Eric. “A Cypherpunk’s Manifesto”. Activism. Mar 09, 1993. Accessed before May 2020. https://www.activism.net/cypherpunk/manifesto.html | |
Web Resources | Ito, Joi. “Our response to ‘A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin”. Mit Media Lab. Dec 20, 2017. Accessed before May 2020. https://www.media.mit.edu/posts/iota-response/ | |
Web Resources | Keller, Chris. “Merkle Trees in Ethereum - A Basic Overview”. Medium. Feb 25, 2019. Accessed between October 2022 and February 2023. https://medium.com/@ckeller615/merkle-trees-in-ethereum-a-basic-overview-e56542c8c2b8 | |
Web Resources | Narula, Neha. “Cryptographic vulnerabilities in IOTA”. Medium. Sep 07, 2017. Accessed before May 2020. https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367 | |
Web Resources | Nomana, Majeed. “Ethereum Scaling Keys: zk-Rollups and Optimistic Rollups”. Blockchain Academy Mittweida. Oct 20, 2021. Accessed between October 2022 and February 2023. https://blockchain-academy.hs-mittweida.de/2021/10/ethereum-scaling-keys-zk-rollups-and-optimistic-rollups/ | |
Web Resources | Petracek, Nelson. “What zero-knowledge proofs will do for blockchain”. VentureBeat. Dec 16, 2017. Accessed before May 2020. https://venturebeat.com/security/what-zero-knowledge-proofs-will-do-for-blockchain/ | |
Web Resources | Prasanna. “Litecoin To Implement Mimblewimble”. Cryptoticker. Feb 08, 2019. Accessed before May 2020. https://cryptoticker.io/en/litecoin-implement-mimblewimble/ | |
Web Resources | Schor, Lukas. “On Zero-Knowledge Proofs in Blockchains”. Medium. Mar 23, 2018. Accessed before May 2020. https://schor.medium.com/on-zero-knowledge-proofs-in-blockchains-14c48cfd1dd1 | |
Web Resources | Szabo, Nick. “Bit gold”. Unenumerated. Dec 27, 2008. Accessed before May 2020. http://unenumerated.blogspot.com/2005/12/bit-gold.html | |
Web Resources | Wetzel, Tyler. “Understanding the Jargon of the Blockchain and Cryptocurrency World”. Medium. Aug 23, 2018. Accessed before May 2020. https://medium.com/@twwetzel76/understanding-the-jargon-of-the-blockchain-and-cryptocurrency-world-64b5f431bcd5 | |
Web Resources | Wikipedia Contributors. “Cryptographic hash function” May 31, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=783169743 | |
Web Resources | Wikipedia Contributors. “Cryptography”. Wikipedia. Apr 22, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptography&oldid=776651451 | |
Web Resources | Wikipedia Contributors. “Digital signature”. Wikipedia. May 26, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Digital_signature&oldid=782296267 | |
Web Resources | Wikipedia Contributors. “Peer-to-peer”. Wikipedia. Jan 05, 2019. Accessed Jan 09, 2019. https://en.wikipedia.org/w/index.php?title=Peer-to-peer&oldid=876963442 | |
Web Resources | Wikipedia Contributors. “Post-quantum cryptography”. Wikipedia. Aug 08, 2021. Accessed between October 2022 and February 2023. https://en.wikipedia.org/w/index.php?title=Post-quantum_cryptography&oldid=1037665575 | |
Web Resources | Wikipedia Contributors. “Public key infrastructure”. WIkipedia. Feb 25, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Public_key_infrastructure&oldid=1141617159 | |
Web Resources | Wikipedia Contributors. “Quantum computing”. Wikipedia. Mar 20, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Quantum_computing&oldid=1145600783 | |
Web Resources | Wouter, Castryck. “Elliptic curves are quantum dead, long live elliptic curves”. COSIC Cryptography Blog. May 31, 2017. Accessed before May 2020. https://www.esat.kuleuven.be/cosic/blog/elliptic-curves-are-quantum-dead-long-live-elliptic-curves/ | |
Web Resources | Young, Joseph. “Anonymous cryptocurrencies: why Edward Snowden supports the concept of evidence with zero disclosure”. Sudonull. Feb 02, 2018. Accessed before May 2020. https://sudonull.com/post/62714-Anonymous-cryptocurrencies-why-Edward-Snowden-supports-the-concept-of-evidence-with-zero-disclosure- | |
Books | Adams, Carlisle; Lloyd, Steve. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, 2001. pp. 11-15. | |
Books | Antonopoulos, Andreas M. Mastering Bitcoin: Programming the Open Blockchain. O’Reilly, 2017 | |
Books | Becket, B. Introduction to Cryptology. Blackwell Scientific Publications, 1988 | |
Books | Bellare, Mihir; Rogaway, Phillip. Introduction to Modern Cryptography. University of California: Davis, 2005. https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf | |
Books | Bertsekas, Dimitri P.; Gallager, Robert G. Data Networks. Prentice Hall, 1992 | |
Books | Boyle, David. The Little Money Book. Alastair Sawday Publishing, 2003 | |
Books | Coulouris, George; Dollimore, Jean; Kindberg, Tim; Blair, Gordon. Distributed Systems: Concepts and Design. 5th ed. Addison-Wesley, 2011 | |
Books | Esslinger, Berhnhard. The CrypTool Script: Cryptography, Mathematics, and More. 10th ed. Distributed with CrypTool version 1.4.30, 2010. https://web.archive.org/web/20110722183013/http://www.cryptool.org/download/CrypToolScript-en.pdf | |
Books | Flannery, Sarah; Flannery, David. In Code: A Mathematical Journey. Workman Publishing Company, 2001 | |
Books | Goldreich, Oded. Foundations of Cryptography. Cambridge: Cambridge University Press, 2001. http://www.myilibrary.com?id=43006 | |
Books | Hurwicz, Leonid; Reiter, Stanley. Designing Economic Mechanisms. Cambridge University Press, 2010. https://doi.org/10.1017/CBO9780511754258 | |
Books | Katz, Jonathan; Lindell, Yehuda. Introductions to Modern Cryptography. CRC Press, Cryptography and Network Security Series, 2nd Edition, 2014 | |
Books | Schär, Fabian; Berentsen, Aleksander. Bitcoin, Blockchain und Kryptoassets: Eine umfassende Einführung. Books on Demand, 2017 | |
Books | Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 6th Edition, 2013 | |
Papers | Alonso, Kurt M. “Zero to Monero: First Edition - A Technical Guide To A Private Digital Currency; For Beginners, Amateurs, And Experts”. Getmonero (2018): https://www.getmonero.org/library/Zero-to-Monero-1-0-0.pdf | |
Papers | Andersen, David; Balakrishnan, Hari; Kaashoek, Frans; Morris, Robert. “Resilient Overlay Networks”. MIT Laboratory for Computer Science (2001): http://nms.lcs.mit.edu/papers/ron-sosp2001.pdf | |
Papers | Bayer, Dave; Haber, Stuart; Stornetta, Wakefield S. “Improving the Efficiency And Reliability of Digital Time-Stamping”. Methods in Communication, Security and Computer Science (March 1992): pp. 329-334. | |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; Green, Matthew; Miers, Ian; Tromer, Eran; Virza, Madars. “Zerocash: Decentralized Anonymous Payments from Bitcoin”. (May 2014): http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf | |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Tromer, Eran; Virza, Madars. “Succint Non-Interactive Zero Knowledge for a von Neumann Architecture”. (February 2019): https://eprint.iacr.org/2013/879.pdf | |
Papers | Chaum, David; Fiat, Amos; Naor, Moni.“Untraceable electronic cash”. For the 88th Proceedings of Advances in Cryptology. New York: Springer (February 1990): pp. 319-327 | |
Papers | Chaum, David. “Blind Signatures for Untraceable Payments”. Advances in Cryptology, Boston, MA: Springer US (1983): pp. 199-203. https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18 | |
Papers | Diffie, Whitfield; Hellman, Martin E. “New Directions in Cryptography”. IEEE Transactions on Information Theory Volume IT-22, Issue 6 (November 1976): https://ee.stanford.edu/~hellman/publications/24.pdf | |
Papers | Haber, Stuart; Stornetta, Wakefield S. “How to time-stamp a digital document”. Journal of Cryptology Volume 3, Issue 2 (January 1991): pp. 99-111. https://doi.org/10.1007/BF00196791 | |
Papers | Lazarov, Ivan; Botha, Quentin; Costa, Nathalia O.; Hackel, Jakob.“Reporting of Cross-Border Transactions for Tax Purposes via DLT”. Communications in Computer and Information Sciences Volume 1633 (August 2022): pp. 282-293. 10.1007/978-3-031-14343-4_26 | |
Papers | Mansfield-Devine, Steve. “Darknets”. Computer Fraud & Security Volume 2009, Issue 12 (December 2009): pp. 4-6. https://doi.org/10.1016/S1361-3723(09)70150-2 | |
Papers | Maymounkov, Petar; Mazières, David. “Kademlia: A Peer-to-peer Information System Based on the XOR Metric”. In Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science Volume 2429 (October 2002): pp. 53-65. https://doi.org/10.1007/3-540-45748-8_5 | |
Papers | McFadden, Daniel. “The human side of mechanism design: a tribute to Leo Hurwicz and Jean-Jacque Laffont”. Review of Economic Design Volume 13, Issue 1-2 (April 2009): pp. 77-100. | |
Papers | Merkle, Ralph C. “Method of providing digital signatures”. US Patent 4309569, 1982. https://patentimages.storage.googleapis.com/69/ab/d9/2ff9f94fada6ea/US4309569.pdf | |
Papers | Merkle, Ralph C. “Secrecy, authentication, and public key systems”. Ph.D. thesis, Stanford University, 1979. http://www.merkle.com/papers/Thesis1979.pdf | |
Papers | Merkle, Ralph C. “Secure Communications Over Insecure Channels”. Communications of the ACM Volume 21, Issue 4 (1978). | |
Papers | Metcalfe, Robert M.; Boggs, David R. “Ethernet: Distributed Packet Switching for Local Computer Networks”. Communications of the ACM Volume 19, Issue 5 (July 1976): pp. 395-404. https://web.archive.org/web/20070807213308/http://www.acm.org/classics/apr96/ | |
Papers | Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System”. (October 2008): https://bitcoin.org/bitcoin.pdf | |
Papers | Nisan, Noam; Ronen, Amir. “Algorithmic Mechanism Design”. Proceedings of the 31st ACM Symposium on Theory of Computing (April 2001): pp. 129-140 | |
Papers | Rivest, Ronald L.; Shamir, Adi; Adleman, Leonard M. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM Volume 21, Issue 2 (February 1978): http://people.csail.mit.edu/rivest/Rsapaper.pdf | |
Papers | Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. “A Measurement Study of Peer-to-Peer File Sharing Systems”. Technical Report UW-CSE-01-06-02, University of Washington, Department of Computer Science and Engineering (July 2001) | |
Papers | Simmonds, Andrew; Sandilands, Peter; van Ekert, Louis. “An Ontology for Network Security Attacks”. In Applied Computing. Lecture Notes in Computer Science, Heidelberg: Springer (2004): pp. 317-323. 10.1007/978-3-540-30176-9_41 | |
Papers | Stevens, Hallam. “Hans Peter Luhn and the birth of the hashing algorithm”. IEEE Spectrum Volume 55, Issue 2 (February 2018): pp. 44-49. 10.1109/MSPEC.2018.8278136 | |
Papers | Stolbikova, Veronika. “Can Elliptic Curve Cryptograph be Trusted? A Brief Analysis of the Security of a Popular Cryptosystem”. ISACA Journal Volume 3 (May 2016). https://www.isaca.org/resources/isaca-journal/issues/2016/volume-3/can-elliptic-curve-cryptography-be-trusted-a-brief-analysis-of-the-security-of-a-popular-cryptosyste#:~:text=Conclusion,a whole%2C remains fairly secure | |
Papers | Wood, Jessica. “The Darknet: A Digital Copyright Revolution”. Richmond Journal of Law and Technology Volume 16, Issue 4 (2010). http://jolt.richmond.edu/v16i4/article14.pdf | |
Project | Bitcoin Core: https://bitcoin.org/de/download | |
Project | Electrum: https://electrum.org/ | |
Project | IPFS: https://ipfs.tech/ | |
Project | Ledger: https://www.ledger.com/ | |
Project | Monero: https://getmonero.org/ | |
Project | SIA: https://sia.tech/ | |
Project | Storj: https://www.storj.io/ | |
Project | Swarm: https://swarmnetwork.org/ | |
Project | Trezor: https://trezor.io/ | |
Project | Zcash: https://z.cash/ |