{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T05:01:11Z","timestamp":1748754071488,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_35","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"350-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fawkescoin"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Bonneau","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"issue":"4","key":"35_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/302350.302353","volume":"32","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Bergadano, F., Crispo, B., Lee, J.H., Manifavas, C., Needham, R.: A new family of authentication protocols. ACM SIGOPS Oper. Syst. Rev. 32(4), 9\u201320 (1998)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"35_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. Submission to NIST (Round 2) 3 (2009)"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/11535218_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"J-S Coron","year":"2005","unstructured":"Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damg\u00e5rd revisited: how to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430\u2013448. Springer, Heidelberg (2005)"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"35_CR5","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International Palo Alto (1979)"},{"key":"35_CR6","unstructured":"Laurie, B.: Decentralised currencies are probably impossible but let\u2019s at least make them efficient (2011)"},{"key":"35_CR7","unstructured":"Maxwell, G.: CoinJoin: Bitcoin privacy for the real world, August 2013. https:\/\/bitcointalk.org\/index.php?topic=279249.0"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"35_CR9","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electionic cash system (2008)"},{"key":"35_CR10","unstructured":"Sompolinsky, Y., Zohar, A.: Accelerating Bitcoin\u2019s transaction processing. Fast Money Grows on Trees, Not Chains. Cryptology ePrint Archive, Report 2013\/881 (2013). http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T09:11:26Z","timestamp":1674897086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_35"}},"subtitle":["A Cryptocurrency Without Public-Key Cryptography"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}