{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:37:31Z","timestamp":1777106251012,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355469","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"199-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Kadcast"],"prefix":"10.1145","author":[{"given":"Elias","family":"Rohrer","sequence":"first","affiliation":[{"name":"Technical University of Berlin, Berlin, Germany"}]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[{"name":"Technical University of Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (2002-03)","unstructured":"2002. IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (2002-03) . 2002. IPTPS '02: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (2002-03)."},{"key":"e_1_3_2_1_2_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. 375--392.","author":"Apostolaki Maria","year":"2017","unstructured":"Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2017 . Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. 375--392. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. 375--392."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","year":"2019","unstructured":"bitnodes. 2019 . Homepage . Retrieved May 21, 2019 from https:\/\/bitnodes.earn.com bitnodes. 2019. Homepage. Retrieved May 21, 2019 from https:\/\/bitnodes.earn.com"},{"key":"e_1_3_2_1_5_1","unstructured":"blockchain.info. 2018. Hashrate Distribution. Retrieved May 6 2018 from https:\/\/blockchain.info\/pools?timespan=4days  blockchain.info. 2018. Hashrate Distribution. Retrieved May 6 2018 from https:\/\/blockchain.info\/pools?timespan=4days"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"e_1_3_2_1_7_1","volume-title":"Practical Byzantine Fault Tolerance. In OSDI '99: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (1999-02)","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov . 1999 . Practical Byzantine Fault Tolerance. In OSDI '99: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (1999-02) . 173--186. Miguel Castro and Barbara Liskov. 1999. Practical Byzantine Fault Tolerance. In OSDI '99: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (1999-02). 173--186."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"key":"e_1_3_2_1_9_1","volume-title":"Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding. In ICBC '19: Proceedings of the 1st International Conference on Blockchain and Cryptocurrency (2019-05)","author":"Chawla Nakul","year":"2019","unstructured":"Nakul Chawla , Hans Walter Behrens , Darren Tapp , Dragan Boscovic , and K Sel\u00e7uk Candan . 2019 . Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding. In ICBC '19: Proceedings of the 1st International Conference on Blockchain and Cryptocurrency (2019-05) . Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K Sel\u00e7uk Candan. 2019. Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding. In ICBC '19: Proceedings of the 1st International Conference on Blockchain and Cryptocurrency (2019-05)."},{"key":"e_1_3_2_1_10_1","volume-title":"Evaluation of Sybil Attacks Protection Schemes in KAD. In AIMS '09: Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security","author":"Cholez Thibault","year":"2009","unstructured":"Thibault Cholez , Isabelle Chrisment , and Olivier Festor . 2009 . Evaluation of Sybil Attacks Protection Schemes in KAD. In AIMS '09: Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security (2009). 70--82. Thibault Cholez, Isabelle Chrisment, and Olivier Festor. 2009. Evaluation of Sybil Attacks Protection Schemes in KAD. In AIMS '09: Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security (2009). 70--82."},{"key":"e_1_3_2_1_11_1","unstructured":"Matt Corallo. 2016. BIP 152: Compact Block Relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki  Matt Corallo. 2016. BIP 152: Compact Block Relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"e_1_3_2_1_12_1","volume-title":"BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research (2016-02)","author":"Croman Kyle","year":"2016","unstructured":"Kyle Croman , Christian Decker , Ittay Eyal , Adem Efe Gencer , Ari Juels , Ahmed E. Kosba , Andrew Miller , Prateek Saxena , Elaine Shi , Emin G\u00fcn Sirer , Dawn Song , and Roger Wattenhofer . 2016 . On Scaling Decentralized Blockchains - (A Position Paper) . In BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research (2016-02) . 106--125. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin G\u00fcn Sirer, Dawn Song, and Roger Wattenhofer. 2016. On Scaling Decentralized Blockchains - (A Position Paper). In BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research (2016-02). 106--125."},{"key":"e_1_3_2_1_13_1","volume-title":"Solution for the broadcasting in the Kademlia peer-to-peer overlay. 57, 8","author":"Czirkos Zolt\u00e1n","year":"2013","unstructured":"Zolt\u00e1n Czirkos and G\u00e1bor Hossz\u00fa . 2013. Solution for the broadcasting in the Kademlia peer-to-peer overlay. 57, 8 ( 2013 ), 1853--1862. Zolt\u00e1n Czirkos and G\u00e1bor Hossz\u00fa. 2013. Solution for the broadcasting in the Kademlia peer-to-peer overlay. 57, 8 (2013), 1853--1862."},{"key":"e_1_3_2_1_14_1","unstructured":"Suhas Daftuar. 2015. BIP 130: sendheaders message. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0130.mediawiki  Suhas Daftuar. 2015. BIP 130: sendheaders message. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0130.mediawiki"},{"key":"e_1_3_2_1_15_1","volume-title":"P2P '13: Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing (2013-09). 1--10.","author":"Decker Christian","unstructured":"Christian Decker and Roger Wattenhofer . 2013. Information propagation in the bitcoin network . In P2P '13: Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing (2013-09). 1--10. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In P2P '13: Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing (2013-09). 1--10."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"John R. Douceur. 2002. The Sybil Attack See [1] 251--260.  John R. Douceur. 2002. The Sybil Attack See [1] 251--260.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_28"},{"key":"e_1_3_2_1_18_1","unstructured":"Ethereum Project. 2014. A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper  Ethereum Project. 2014. A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","year":"2019","unstructured":"Etherscan.io. 2019 . Ethereum Block Size History . Retrieved May 24, 2019 from https:\/\/etherscan.io\/chart\/blocksize Etherscan.io. 2019. Ethereum Block Size History. Retrieved May 24, 2019 from https:\/\/etherscan.io\/chart\/blocksize"},{"key":"e_1_3_2_1_20_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI '16: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (2016-03)","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI '16: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (2016-03) . 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI '16: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (2016-03). 45--59."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_22_1","volume-title":"Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath.","author":"Fanti Giulia C.","year":"2018","unstructured":"Giulia C. Fanti , Shaileshh Bojja Venkatakrishnan , Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018 . Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees . 2, 2 (2018), 29:1-29:35. Giulia C. Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. 2, 2 (2018), 29:1-29:35."},{"key":"e_1_3_2_1_23_1","volume-title":"NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems (2017-12)","author":"Giulia","unstructured":"Giulia C. Fanti and Pramod Viswanath. 2017. Deanonymization in the Bitcoin P2P Network . In NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems (2017-12) . Giulia C. Fanti and Pramod Viswanath. 2017. Deanonymization in the Bitcoin P2P Network. In NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems (2017-12)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.542"},{"key":"e_1_3_2_1_25_1","unstructured":"Fast Internet Bitcoin Relay Engine (FIBRE). 2017. Homepage. Retrieved August 1 2017 from http:\/\/bitcoinfibre.org  Fast Internet Bitcoin Relay Engine (FIBRE). 2017. Homepage. Retrieved August 1 2017 from http:\/\/bitcoinfibre.org"},{"key":"e_1_3_2_1_26_1","volume-title":"The Bitcoin Backbone Protocol: Analysis and Applications. In EUROCRYPT '15: Proceedings of the 34th International Conference on the Theory and Applications of Cryptographic Techniques (2015-04)","author":"Garay Juan A.","year":"2015","unstructured":"Juan A. Garay , Aggelos Kiayias , and Nikos Leonardos . 2015 . The Bitcoin Backbone Protocol: Analysis and Applications. In EUROCRYPT '15: Proceedings of the 34th International Conference on the Theory and Applications of Cryptographic Techniques (2015-04) . 281--310. Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In EUROCRYPT '15: Proceedings of the 34th International Conference on the Theory and Applications of Cryptographic Techniques (2015-04). 281--310."},{"key":"e_1_3_2_1_27_1","volume-title":"On the Security and Performance of Proof of Work Blockchains. In CCS '16: Proceedings of the 23nd ACM SIGSAC Conference on Computer and Communications Security (2016-10)","author":"Gervais Arthur","year":"2016","unstructured":"Arthur Gervais , Ghassan Karame , Karl W\u00fcst , Vasileios Glykantzis , Hubert Ritzdorf , and Srdjan Capkun . 2016 . On the Security and Performance of Proof of Work Blockchains. In CCS '16: Proceedings of the 23nd ACM SIGSAC Conference on Computer and Communications Security (2016-10) . Arthur Gervais, Ghassan Karame, Karl W\u00fcst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In CCS '16: Proceedings of the 23nd ACM SIGSAC Conference on Computer and Communications Security (2016-10)."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security '15: Proceedings of the 24th USENIX Security Symposium (2015-08)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In USENIX Security '15: Proceedings of the 24th USENIX Security Symposium (2015-08) . 129--144. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security '15: Proceedings of the 24th USENIX Security Symposium (2015-08). 129--144."},{"key":"e_1_3_2_1_29_1","unstructured":"iPlane. 2019. An Information Plane for Distributed Services. web.eecs.umich.edu\/~harshavm\/iplane\/.  iPlane. 2019. An Information Plane for Distributed Services. web.eecs.umich.edu\/~harshavm\/iplane\/."},{"key":"e_1_3_2_1_30_1","volume-title":"NDSS '12: Proceedings of the Network and Distributed System Security Symposium","author":"Jansen Rob","year":"2012","unstructured":"Rob Jansen and Nicholas Hopper . 2012 . Shadow: Running Tor in a Box for Accurate and Efficient Experimentation . In NDSS '12: Proceedings of the Network and Distributed System Security Symposium (2012). Rob Jansen and Nicholas Hopper. 2012. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In NDSS '12: Proceedings of the Network and Distributed System Security Symposium (2012)."},{"key":"e_1_3_2_1_31_1","volume-title":"The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. abs\/1810.02466","author":"Kaiser Ben","year":"2018","unstructured":"Ben Kaiser , Mireya Jurado , and Alex Ledger . 2018. The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. abs\/1810.02466 ( 2018 ). Ben Kaiser, Mireya Jurado, and Alex Ledger. 2018. The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. abs\/1810.02466 (2018)."},{"key":"e_1_3_2_1_32_1","volume-title":"Double-spending Fast Payments in Bitcoin. In CCS '12: Proceedings of the 19th ACM Conference on Computer and Communications Security (2012-10)","author":"Karame Ghassan O.","year":"2012","unstructured":"Ghassan O. Karame , Elli Androulaki , and Srdjan Capkun . 2012 . Double-spending Fast Payments in Bitcoin. In CCS '12: Proceedings of the 19th ACM Conference on Computer and Communications Security (2012-10) . 906--917. Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending Fast Payments in Bitcoin. In CCS '12: Proceedings of the 19th ACM Conference on Computer and Communications Security (2012-10). 906--917."},{"key":"e_1_3_2_1_33_1","volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO '17: Proceedings of the 37th Conference on Advances in Cryptology (2017-08)","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2017 . Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO '17: Proceedings of the 37th Conference on Advances in Cryptology (2017-08) . 357--388. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO '17: Proceedings of the 37th Conference on Advances in Cryptology (2017-08). 357--388."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"e_1_3_2_1_35_1","unstructured":"Uri Klarman Soumya Basu Aleksandar Kuzmanovic and Emin G\u00fcn Sirer. 2018. bloXroute: A Scalable Trustless Blockchain Distribution Network WHITEPAPER.  Uri Klarman Soumya Basu Aleksandar Kuzmanovic and Emin G\u00fcn Sirer. 2018. bloXroute: A Scalable Trustless Blockchain Distribution Network WHITEPAPER."},{"key":"e_1_3_2_1_36_1","volume-title":"Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. In NETWORKING '09: Proceedings of the 8th International IFIP-TC 6 Networking Conference","author":"Kohnen Michael","year":"2009","unstructured":"Michael Kohnen , Mike Leske , and Erwin P. Rathgeb . 2009 . Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. In NETWORKING '09: Proceedings of the 8th International IFIP-TC 6 Networking Conference ( 2009 ). 104--116. Michael Kohnen, Mike Leske, and Erwin P. Rathgeb. 2009. Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. In NETWORKING '09: Proceedings of the 8th International IFIP-TC 6 Networking Conference (2009). 104--116."},{"key":"e_1_3_2_1_37_1","volume-title":"Poisoning the Kad Network. In ICDCN '10: Proceedings of the 11th International Conference on Distributed Computing and Networking","author":"Locher Thomas","year":"2010","unstructured":"Thomas Locher , David Mysicka , Stefan Schmid , and Roger Wattenhofer . 2010 . Poisoning the Kad Network. In ICDCN '10: Proceedings of the 11th International Conference on Distributed Computing and Networking (2010). 195--206. Thomas Locher, David Mysicka, Stefan Schmid, and Roger Wattenhofer. 2010. Poisoning the Kad Network. In ICDCN '10: Proceedings of the 11th International Conference on Distributed Computing and Networking (2010). 195--206."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"M. Luby A. Shokrollahi M. Watson T. Stockhammer and L. Minder. 2011. Rap-torQ Forward Error Correction Scheme for Object Delivery. RFC 6330 (Proposed Standard). 69 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6330.txt  M. Luby A. Shokrollahi M. Watson T. Stockhammer and L. Minder. 2011. Rap-torQ Forward Error Correction Scheme for Object Delivery. RFC 6330 (Proposed Standard). 69 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6330.txt","DOI":"10.17487\/rfc6330"},{"key":"e_1_3_2_1_39_1","volume-title":"Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. 2018","author":"Marcus Yuval","year":"2018","unstructured":"Yuval Marcus , Ethan Heilman , and Sharon Goldberg . 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. 2018 ( 2018 ), 236. Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. 2018 (2018), 236."},{"key":"e_1_3_2_1_40_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, See [1], 53--65.","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazi\u00e8res . 2002 . Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, See [1], 53--65. Petar Maymounkov and David Mazi\u00e8res. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, See [1], 53--65."},{"key":"e_1_3_2_1_41_1","volume-title":"CSET '15: Proceedings of the 8th Workshop on Cyber Security Experimentation and Test (2015-08)","author":"Miller Andrew","year":"2015","unstructured":"Andrew Miller and Rob Jansen . 2015 . Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-Threaded Applications . In CSET '15: Proceedings of the 8th Workshop on Cyber Security Experimentation and Test (2015-08) . Andrew Miller and Rob Jansen. 2015. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-Threaded Applications. In CSET '15: Proceedings of the 8th Workshop on Cyber Security Experimentation and Test (2015-08)."},{"key":"e_1_3_2_1_42_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_43_1","volume-title":"Bandwidth-Efficient Transaction Relay for Bitcoin. CoRR abs\/1905.10518","author":"Naumenko Gleb","year":"2019","unstructured":"Gleb Naumenko , Gregory Maxwell , Pieter Wuille , Sasha Fedorova , and Ivan Beschastnikh . 2019. Bandwidth-Efficient Transaction Relay for Bitcoin. CoRR abs\/1905.10518 ( 2019 ). arXiv:1905.10518 Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Sasha Fedorova, and Ivan Beschastnikh. 2019. Bandwidth-Efficient Transaction Relay for Bitcoin. CoRR abs\/1905.10518 (2019). arXiv:1905.10518"},{"key":"e_1_3_2_1_44_1","volume-title":"Retrieved","author":"Karlsruhe Institute of Technology DSN.","year":"2018","unstructured":"Karlsruhe Institute of Technology DSN. 2018 . Bitcoin Monitoring . Retrieved April 26, 2018 from https:\/\/dsn.tm.kit.edu\/bitcoin\/ Karlsruhe Institute of Technology DSN. 2018. Bitcoin Monitoring. Retrieved April 26, 2018 from https:\/\/dsn.tm.kit.edu\/bitcoin\/"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342082"},{"key":"e_1_3_2_1_46_1","volume-title":"Analysis of the Blockchain Protocol in Asynchronous Networks. In EUROCRYPT 17: Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass , Lior Seeman , and Abhi Shelat . 2017 . Analysis of the Blockchain Protocol in Asynchronous Networks. In EUROCRYPT 17: Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques (2017). 643--673. Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the Blockchain Protocol in Asynchronous Networks. In EUROCRYPT 17: Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques (2017). 643--673."},{"key":"e_1_3_2_1_47_1","volume-title":"Evaluation of the Broadcast Operation in Kademlia. In HPCC '12: 14th IEEE International Conference on High Performance Computing and Communication","author":"Peris Antonio Delgado","year":"2012","unstructured":"Antonio Delgado Peris , Jos\u00e9 M. Hern\u00e1ndez , and Eduardo Huedo . 2012 . Evaluation of the Broadcast Operation in Kademlia. In HPCC '12: 14th IEEE International Conference on High Performance Computing and Communication (2012). 756--763. Antonio Delgado Peris, Jos\u00e9 M. Hern\u00e1ndez, and Eduardo Huedo. 2012. Evaluation of the Broadcast Operation in Kademlia. In HPCC '12: 14th IEEE International Conference on High Performance Computing and Communication (2012). 756--763."},{"key":"e_1_3_2_1_48_1","volume-title":"Evaluation of alternatives for the broadcast operation in Kademlia under churn. 9, 2","author":"Peris Antonio Delgado","year":"2016","unstructured":"Antonio Delgado Peris , Jos\u00e9 M. Hern\u00e1ndez , and Eduardo Huedo . 2016. Evaluation of alternatives for the broadcast operation in Kademlia under churn. 9, 2 ( 2016 ), 313--327. Antonio Delgado Peris, Jos\u00e9 M. Hern\u00e1ndez, and Eduardo Huedo. 2016. Evaluation of alternatives for the broadcast operation in Kademlia under churn. 9, 2 (2016), 313--327."},{"key":"e_1_3_2_1_49_1","unstructured":"ns-3 Network Simulator. 2018. Homepage. Retrieved May 5 2018 from https:\/\/www.nsnam.org  ns-3 Network Simulator. 2018. Homepage. Retrieved May 5 2018 from https:\/\/www.nsnam.org"},{"key":"e_1_3_2_1_50_1","first-page":"1159","article-title":"SPECTRE","volume":"2016","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky , Yoad Lewenberg , and Aviv Zohar . 2016 . SPECTRE : A Fast and Scalable Cryptocurrency Protocol. 2016 (2016), 1159 . Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. 2016 (2016), 1159.","journal-title":"A Fast and Scalable Cryptocurrency Protocol."},{"key":"e_1_3_2_1_51_1","volume-title":"Secure High-Rate Transaction Processing in Bitcoin. In FC '15: Proceedings of the 19th International Conference on Financial Cryptography and Data Security (2015-01)","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar . 2015 . Secure High-Rate Transaction Processing in Bitcoin. In FC '15: Proceedings of the 19th International Conference on Financial Cryptography and Data Security (2015-01) . 507--527. Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In FC '15: Proceedings of the 19th International Conference on Financial Cryptography and Data Security (2015-01). 507--527."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2017-036"},{"key":"e_1_3_2_1_53_1","unstructured":"Speedtest.net. 2019. Global Index. https:\/\/www.speedtest.net\/global-index.  Speedtest.net. 2019. Global Index. https:\/\/www.speedtest.net\/global-index."},{"key":"e_1_3_2_1_54_1","volume-title":"Biersack","author":"Steiner Moritz","year":"2007","unstructured":"Moritz Steiner , Taoufik En-Najjary , and Ernst W . Biersack . 2007 . Exploiting KAD : possible uses and misuses. 37, 5 (2007), 65--70. Moritz Steiner, Taoufik En-Najjary, and Ernst W. Biersack. 2007. Exploiting KAD: possible uses and misuses. 37, 5 (2007), 65--70."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_56_1","volume-title":"A survey of DHT security techniques. 43, 2","author":"Urdaneta Guido","year":"2011","unstructured":"Guido Urdaneta , Guillaume Pierre , and Maarten van Steen . 2011. A survey of DHT security techniques. 43, 2 ( 2011 ), 8:1--8:49. Guido Urdaneta, Guillaume Pierre, and Maarten van Steen. 2011. A survey of DHT security techniques. 43, 2 (2011), 8:1--8:49."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078528"},{"key":"e_1_3_2_1_59_1","volume-title":"Karma: A secure economic framework for peer-to-peer resource sharing. In P2PEcon '03: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems (2003-06).","author":"Vishnumurthy Vivek","year":"2003","unstructured":"Vivek Vishnumurthy , Sangeeth Chandrakumar , and Emin Gun Sirer . 2003 . Karma: A secure economic framework for peer-to-peer resource sharing. In P2PEcon '03: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems (2003-06). Vivek Vishnumurthy, Sangeeth Chandrakumar, and Emin Gun Sirer. 2003. Karma: A secure economic framework for peer-to-peer resource sharing. In P2PEcon '03: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems (2003-06)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460907"},{"key":"e_1_3_2_1_61_1","volume-title":"Nicholas Hopper, and Yongdae Kim.","author":"Wang Peng","year":"2013","unstructured":"Peng Wang , James Tyra , Eric Chan-Tin , Tyson Malchow , Denis Foo Kune , Nicholas Hopper, and Yongdae Kim. 2013 . Attacking the kad network - real world evaluation and high fidelity simulation using DVN. 6, 12 (2013), 1556--1575. Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, and Yongdae Kim. 2013. Attacking the kad network - real world evaluation and high fidelity simulation using DVN. 6, 12 (2013), 1556--1575."},{"key":"e_1_3_2_1_62_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A Secure Decentralised Generalised Transaction Ledger . http:\/\/gavwood.com\/Paper.pdf Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. http:\/\/gavwood.com\/Paper.pdf"}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:34Z","timestamp":1750268974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355469"}},"subtitle":["A Structured Approach to Broadcast in Blockchain Networks"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":62,"alternative-id":["10.1145\/3318041.3355469","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355469","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}