{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:17:48Z","timestamp":1774019868714,"version":"3.50.1"},"reference-count":69,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906988","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:12:50Z","timestamp":1493068370000},"page":"745-752","source":"Crossref","is-referenced-by-count":224,"title":["A brief survey of Cryptocurrency systems"],"prefix":"10.1109","author":[{"given":"Ujan","family":"Mukhopadhyay","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Skjellum","sequence":"additional","affiliation":[]},{"given":"Oluwakemi","family":"Hambolu","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Oakley","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Brooks","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"280","article-title":"Bitcoin mining and its energy footprint","author":"o'dwyer","year":"2013","journal-title":"Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014\/CIICT 2014) 25th lET"},{"key":"ref38","year":"2014","journal-title":"anonymous Mining difficulty metric"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref32","year":"2014","journal-title":"anonymous Proof of stake"},{"key":"ref31","year":"2014","journal-title":"anonymous Fifty one percent"},{"key":"ref30","year":"2012","journal-title":"Electr&#x00F3;nica Back A (2002 Agosto) Hashcash-a denial of service counter-measure Electr&#x00F3;nica Bershidsky L (2014 En-ero) Did ukrainians almost take over bitcoin"},{"key":"ref37","first-page":"131","article-title":"Optimizing sha256 in bitcoin mining","author":"nicolas","year":"2014","journal-title":"Cryptography and Security Systems"},{"key":"ref36","article-title":"The hashcash proof-of-work function","year":"2003","journal-title":"Draft-Hashcash-back-00 Internet-Draft Created"},{"key":"ref35","year":"2014","journal-title":"anonymous Market capitalization of cryptocurrencies"},{"key":"ref34","article-title":"A survey of solutions to the sybil attack","volume":"7","author":"brian","year":"2006","journal-title":"University of Massachusetts Amherst Amherst MA"},{"key":"ref60","article-title":"Cubehash specification (2. b. 1)","author":"bernstein","year":"2008","journal-title":"Submission to NIST"},{"key":"ref62","article-title":"High-speed hardware implementations of blake, blue midnight wish, cubehash, echo, fugue, gr&#x00F6;stl hamsi, jh, keccak, luffa, shabal, shavite-3, simd, and skein","volume":"510","author":"tillich","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref61","first-page":"113","article-title":"The shavite-3 hash function","author":"biham","year":"2009","journal-title":"Submission to NIST (Round 2)"},{"key":"ref63","first-page":"369","article-title":"Subspace distinguisher for 5\/8 rounds of the echo-256 hash function","author":"schl\u00e4ffer","year":"2010","journal-title":"Workshop Selected Areas in Cryptography"},{"key":"ref28","year":"2014","journal-title":"anonymous Limit"},{"key":"ref64","year":"2014","journal-title":"anonymous Cryptonight"},{"key":"ref27","year":"2014","journal-title":"anonymous Proof of work"},{"key":"ref65","article-title":"Cryptocurrencies, network effects, and switching costs","author":"luther","year":"2015","journal-title":"Contemporary Economic Policy"},{"key":"ref66","year":"2011","journal-title":"Mark Karpeles Clarification of mt gox compromised accounts and major bitcoin sell-off"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref67","year":"2014","journal-title":"anonymous Failed cryptocurrencies"},{"key":"ref68","author":"chuen lee","year":"2014","journal-title":"The cryptocurrency revolution and its impact"},{"key":"ref69","year":"2014","journal-title":"anonymous Fail qubic"},{"key":"ref2","year":"2014","journal-title":"anonymous Mining"},{"key":"ref1","article-title":"An analysis of the cryptocurrency industry","author":"farell","year":"2015","journal-title":"available at repository upenn edu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.1997.643931"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3386\/w16721"},{"key":"ref21","author":"eisenmann","year":"2006","journal-title":"Paypal merchant services"},{"key":"ref24","author":"loera","year":"2014","journal-title":"Method of making securing and using a cryptocurrency wallet"},{"key":"ref23","author":"gregory mankiw","year":"2014","journal-title":"Principles of Macroeconomics"},{"key":"ref26","year":"0"},{"key":"ref25","year":"2014","journal-title":"anonymous Block"},{"key":"ref50","first-page":"175","article-title":"Security analysis of sha-256 and sisters","author":"gilbert","year":"2003","journal-title":"Selected Areas in Cryptography"},{"key":"ref51","first-page":"1","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"2009","journal-title":"self published"},{"key":"ref59","article-title":"Hash function luffa: specification","author":"de canniere","year":"2009","journal-title":"Submission to NIST (Round 2)"},{"key":"ref58","article-title":"The skein hash function family","volume":"7","author":"ferguson","year":"2010","journal-title":"Submission to NIST (Round 3)"},{"key":"ref57","article-title":"The keccak sha-3 submission","volume":"6","author":"bertoni","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"key":"ref56","first-page":"6","article-title":"The hash function jh","author":"hongjun","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"key":"ref55","article-title":"On optimized fpga implementations of the sha-3 candidate groestl","author":"jungk","year":"2009","journal-title":"IACR Cryptology EPrint Archive 2009"},{"key":"ref54","first-page":"44","article-title":"Resource-efficient implementation of blue midnight wish-256 hash function on xilinx fpga platform","author":"mohamed","year":"2010","journal-title":"2010 Sixth International Conference on Information Assurance and Security"},{"key":"ref53","year":"2014","journal-title":"anonymous Hashx11"},{"key":"ref52","article-title":"Orr Dunkelman and Dmitry Khovratovich. Iterative differentials, symmetries, and message modification in blake-256","volume":"2011","year":"2011","journal-title":"Ecrypt Hash Workshop"},{"key":"ref10","article-title":"An empirical study of namecoin and lessons for decentralized namespace design","author":"kalodner","year":"2015","journal-title":"Technical Report Citeseer"},{"key":"ref11","article-title":"Auroracoin airdrop: Will iceland embrace a national digital currency","volume":"24","author":"cawrey","year":"2014","journal-title":"CoinDesk March"},{"key":"ref40","author":"polkinghome","year":"1989","journal-title":"Application-Specific Integrated Circuits"},{"key":"ref12","author":"vasin","year":"2014","journal-title":"Blackcoin's proof-of-stake protocol v2"},{"key":"ref13","year":"2014","journal-title":"anonymous Dash"},{"key":"ref14","year":"2014","journal-title":"anonymous Decred"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"ref16","author":"swan","year":"2015","journal-title":"Blockchain Blueprint for a new economy &#x201C; O'Reilly Media Inc &#x201D;"},{"key":"ref17","year":"2014","journal-title":"anonymous Blockchain"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"ref19","first-page":"42","article-title":"A survey on crypto currencies","author":"ahamad","year":"2013","journal-title":"4th International Conference on Advances in Computer Science AETACS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-005-0086-5"},{"key":"ref3","author":"teutsch","year":"0","journal-title":"When cryptocurrencies mine their own business"},{"key":"ref6","author":"lee","year":"2011","journal-title":"Litecoin"},{"key":"ref5","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref8","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref7","article-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"king","year":"2012","journal-title":"self-published paper August"},{"key":"ref49","article-title":"Chacha, a variant of salsa20","volume":"8","author":"bernstein","year":"2008","journal-title":"Workshop Record of SASC"},{"key":"ref9","first-page":"5","article-title":"The ripple protocol consensus algorithm","author":"schwartz","year":"2014","journal-title":"Ripple Labs Inc White Paper"},{"key":"ref46","year":"2014","journal-title":"Mike Croteau and Emir Litranab Proof of stake Definite an implementation of constant staking rewards to promote increased network activity"},{"key":"ref45","article-title":"Vitalik Buterin. A next-generation smart contract and decentralized application platform","year":"2014","journal-title":"White Paper"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-642-38980-1_8","article-title":"Blake2: simpler, smaller, fast as md5","author":"aumasson","year":"2013","journal-title":"International Conference on Applied Cryptography and Network Security"},{"key":"ref47","year":"2014","journal-title":"Evan Duffield and Kyle Hagan Darkcoin Peertopeer cryptocurrency with anonymous blockchain transactions and an improved proofofwork system"},{"key":"ref42","year":"2015","journal-title":"Colin Percival and Simon Josefsson The scrypt password-based key derivation function"},{"key":"ref41","author":"krzysztof","year":"2014","journal-title":"Bitcoin developer reference"},{"key":"ref44","year":"2014","journal-title":"anonymous Ethash"},{"key":"ref43","year":"2014","journal-title":"anonymous Sha2 and scrypt"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906988.pdf?arnumber=7906988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:54:54Z","timestamp":1569095694000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906988","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}