{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:19:49Z","timestamp":1769300389198,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030371098","type":"print"},{"value":"9783030371104","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_6","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:04:03Z","timestamp":1581602643000},"page":"77-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Compact Storage of Superblocks for NIPoPoW Applications"],"prefix":"10.1007","author":[{"given":"Kostis","family":"Karantias","sequence":"first","affiliation":[]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[]},{"given":"Dionysis","family":"Zindros","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"6_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf (2008)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. Part II, volume 9057 of LNCS, pp. 281\u2013310. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"6_CR3","unstructured":"Miller, A.: The high-value-hash highway, bitcoin forum post (2012)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Lamprou, N., Stouka, A.-P.: Proofs of proofs of work with sublinear complexity. In: International Conference on Financial Cryptography and Data Security, Springer, pp. 61\u201378 (2016)","DOI":"10.1007\/978-3-662-53357-4_5"},{"key":"6_CR5","unstructured":"B\u00fcnz, B., Kiffer, L., Luu, L., Zamani, M.: FlyClient: super-light clients for cryptocurrencies. Cryptology ePrint Archive, Report 2019\/226. https:\/\/eprint.iacr.org\/2019\/226 (2019)"},{"key":"6_CR6","unstructured":"Chepurnoy, A., Meshkov, D., Oskin, I., Aksarin, M., Andreev, A., Slesarenko, A., Zadorozhnyi, D., Manzanares, G.: Ergo. https:\/\/ergoplatform.org (2018)"},{"key":"6_CR7","unstructured":"Chin, E., von Styp-Rekowsky, P., Linus, R.: Nimiq. https:\/\/nimiq.com (2018)"},{"key":"6_CR8","unstructured":"Buterin, V.: EIP 210: blockhash refactoring. Technical report (Feb 2017)"},{"key":"6_CR9","unstructured":"Buschbeck, S.: Nimiq developer reference. https:\/\/nimiq-network.github.io\/developer-reference\/chapters\/block.html#interlink (2018)"},{"key":"6_CR10","unstructured":"Kiayias, A., Miller, A., Zindros, D.: Non-Interactive Proofs of Proof-of-Work (2017)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., Knottenbelt, W., Zamyatin, A.: A wild velvet fork appears! inclusive blockchain protocol changes in practice. In: International Conference on Financial Cryptography and Data Security, Springer (2018)","DOI":"10.1007\/978-3-662-58820-8_3"},{"key":"6_CR12","unstructured":"Karantias, K.: Enabling NIPoPoW applications on bitcoin cash. Master\u2019s thesis (2019). University of Ioannina, Ioannina, Greece"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Zindros, D.: Proof-of-work sidechains. In: International Conference on Financial Cryptography and Data Security, Springer (2019)","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Ga\u017ei, P., Zindros, D.: Proof-of-stake sidechains. In: IEEE Symposium on Security and Privacy, IEEE (2019)","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO\u201992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-48071-4_10"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 93, pp. 62\u201373. ACM Press (1993)","DOI":"10.1145\/168588.168596"},{"key":"6_CR18","unstructured":"Papadakis, T.: Skip lists and probabilistic analysis of algorithms. Ph.D. thesis (1993). University of Waterloo"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. In: Workshop on Algorithms and Data Structures, Springer, pp. 437\u2013449 (1989)","DOI":"10.1007\/3-540-51542-9_36"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Conference on the Theory and Application of Cryptographic Techniques, Springer, pp. 369\u2013378 (1987)","DOI":"10.1007\/3-540-48184-2_32"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of Bitcoin OP_RETURN metadata. In: International Conference on Financial Cryptography and Data Security, Springer, pp. 218\u2013230 (2017)","DOI":"10.1007\/978-3-319-70278-0_14"},{"key":"6_CR22","unstructured":"Buterin, V. et\u00a0al.: A next-generation smart contract and decentralized application platform. White Paper (2014)"},{"key":"6_CR23","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"6_CR24","unstructured":"Christoglou, G.: Enabling crosschain transactions using NIPoPoWs. Master\u2019s thesis (2018). Imperial College London"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T09:44:37Z","timestamp":1665827077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_6","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"value":"2198-7246","type":"print"},{"value":"2198-7254","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}