{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:59:38Z","timestamp":1743145178184,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_3","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"23-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies"],"prefix":"10.1007","author":[{"given":"Souvik","family":"Sur","sequence":"first","affiliation":[]},{"given":"Abhijit","family":"Das","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"unstructured":"Back A (1997) http:\/\/www.cypherspace.org\/hashcash","key":"3_CR1"},{"doi-asserted-by":"publisher","unstructured":"Benini L, Hodgson R, Siegel P (1998) System-level power estimation and optimization. In: Chandrakasan, A., Kiaei, S. (eds.) Proceedings of the 1998 International Symposium on Low Power Electronics and Design, 1998, Monterey, California, USA, August 10-12, 1998. pp 173\u2013178. ACM. https:\/\/doi.org\/10.1145\/280756.280881","key":"3_CR2","DOI":"10.1145\/280756.280881"},{"doi-asserted-by":"publisher","unstructured":"Bertoni G, Daemen J, Peeters M, Assche GV (2013) Keccak. In: Johansson T, Nguyen PQ (eds) Advances in cryptology - EUROCRYPT 2013, 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26-30, 2013. Proceedings. Lecture notes in computer science, vol\u00a07881. Springer, pp 313\u2013314. https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19","key":"3_CR3","DOI":"10.1007\/978-3-642-38348-9_19"},{"unstructured":"Bitcoin Community (2011) Open source FPGA bitcoin miner \u2014 Bitcoin Wiki. https:\/\/en.bitcoin.it\/wiki\/Open_Source_FPGA_Bitcoin_Miner. Accessed 27 Oct 2021","key":"3_CR4"},{"doi-asserted-by":"publisher","unstructured":"Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans. CAD Integr Circuits Syst 15:325\u2013335. https:\/\/doi.org\/10.1109\/43.489103","key":"3_CR5","DOI":"10.1109\/43.489103"},{"unstructured":"Chaudhuri,PP, Chowdhury DR, Nandi S, Chattopadhyay S (1997) Additive cellular automata: theory and applications, vol\u00a01. Wiley","key":"3_CR6"},{"doi-asserted-by":"publisher","unstructured":"Chohan U (2017) Cryptocurrencies: A brief thematic review. SSRN Electron J (2017). https:\/\/doi.org\/10.2139\/ssrn.3024330","key":"3_CR7","DOI":"10.2139\/ssrn.3024330"},{"doi-asserted-by":"publisher","unstructured":"Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. In: Brickell EF (ed) Advances in cryptology - CRYPTO \u201992, 12th annual international cryptology conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. Lecture notes in computer science, vol\u00a0740. Springer, pp 139\u2013147. https:\/\/doi.org\/10.1007\/3-540-48071-4_10","key":"3_CR8","DOI":"10.1007\/3-540-48071-4_10"},{"doi-asserted-by":"publisher","unstructured":"Garay JA, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: analysis and applications. In: Oswald E, Fischlin M (eds) Advances in cryptology - EUROCRYPT 2015 - 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26-30, 2015, proceedings, Part II. Lecture notes in computer science, vol\u00a09057. Springer, pp 281\u2013310. https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10","key":"3_CR9","DOI":"10.1007\/978-3-662-46803-6_10"},{"doi-asserted-by":"publisher","unstructured":"Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols (extended abstract). Springer, US, Boston, MA, pp 258\u2013272. https:\/\/doi.org\/10.1007\/978-0-387-35568-9_18","key":"3_CR10","DOI":"10.1007\/978-0-387-35568-9_18"},{"doi-asserted-by":"publisher","unstructured":"Kiayias A, Lamprou N, Stouka A (2016) Proofs of proofs of work with sublinear complexity. In: Clark J, Meiklejohn S, Ryan PYA, Wallach DS, Brenner M, Rohloff K (eds.) Financial cryptography and data security - FC 2016 international workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture notes in computer science, vol\u00a09604. Springer, pp 61\u201378. https:\/\/doi.org\/10.1007\/978-3-662-53357-4_5","key":"3_CR11","DOI":"10.1007\/978-3-662-53357-4_5"},{"unstructured":"Lee C (2011) Litecoin foundation. https:\/\/litecoin-foundation.org\/","key":"3_CR12"},{"key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","author":"A Menezes","year":"1996","unstructured":"Menezes A, van Oorschot PC, Vanstone SA (1996). Handbook of applied cryptography. https:\/\/doi.org\/10.1201\/9781439821916","journal-title":"Handbook of applied cryptography."},{"unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system","key":"3_CR14"},{"unstructured":"National Institute of Standards and Technology (2002) FIPS PUB 180-2: Secure Hash Standard. http:\/\/www.itl.nist.gov\/fipspubs\/fip180-2.html, supersedes FIPS PUB 180 1995 Apr 17","key":"3_CR15"},{"unstructured":"Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto. Technical report, MIT, USA","key":"3_CR16"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:50Z","timestamp":1646488970000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}