{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:21:59Z","timestamp":1766442119919,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-22-CE25-0001"],"award-info":[{"award-number":["ANR-22-CE25-0001"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744874","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"888-902","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mining in Logarithmic Space with Variable Difficulty"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4717-641X","authenticated-orcid":false,"given":"Lo\u00efc","family":"Miller","sequence":"first","affiliation":[{"name":"IMT Atlantique \/ IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6976-4959","authenticated-orcid":false,"given":"Dorian","family":"Pacaud","sequence":"additional","affiliation":[{"name":"IMT Atlantique \/ IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4655-9203","authenticated-orcid":false,"given":"Nathan\u00ebl","family":"Derousseaux-Lebert","sequence":"additional","affiliation":[{"name":"IMT Atlantique \/ IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4158-149X","authenticated-orcid":false,"given":"Emmanuelle","family":"Anceaume","sequence":"additional","affiliation":[{"name":"CNRS \/ IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4997-4813","authenticated-orcid":false,"given":"Romaric","family":"Ludinard","sequence":"additional","affiliation":[{"name":"IMT Atlantique \/ IRISA, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91014-3_9"},{"key":"e_1_3_2_1_2_1","unstructured":"Adam Back. 2002. Hashcash - A Denial of Service Counter-Measure. (2002)."},{"key":"e_1_3_2_1_3_1","unstructured":"Adam Back Matt Corallo Luke Dashjr Mark Friedenbach Gregory Maxwell Andrew K. Miller Andrew Poelstra and Jorge Tim\u00f3n. 2014. Enabling Blockchain Innovations with Pegged. https:\/\/api.semanticscholar.org\/CorpusID:18659636"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_5_1","volume-title":"Coda: Decentralized Cryptocurrency at Scale. IACR Cryptol. ePrint Arch.","author":"Bonneau Joseph","year":"2020","unstructured":"Joseph Bonneau, Izaak Meckler, Vanishree Rao, and Evan Shapiro. 2020a. Coda: Decentralized Cryptocurrency at Scale. IACR Cryptol. ePrint Arch. (2020), 352. https:\/\/eprint.iacr.org\/2020\/352"},{"key":"e_1_3_2_1_6_1","volume-title":"Mina: Decentralized Cryptocurrency at Scale. https:\/\/minaprotocol.com\/wp-content\/uploads\/technicalWhitepaper.pdf","author":"Bonneau Joseph","year":"2020","unstructured":"Joseph Bonneau, Izaak Meckler, Vanishree Rao, and Evan Shapiro. 2020b. Mina: Decentralized Cryptocurrency at Scale. https:\/\/minaprotocol.com\/wp-content\/uploads\/technicalWhitepaper.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00049"},{"key":"e_1_3_2_1_8_1","volume-title":"Casper the Friendly Finality Gadget. ArXiv","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. ArXiv, Vol. abs\/1710.09437 (2017). https:\/\/api.semanticscholar.org\/CorpusID:11301538"},{"key":"e_1_3_2_1_9_1","volume-title":"Edrax: A Cryptocurrency with Stateless Transaction Validation. IACR Cryptol. ePrint Arch.","author":"Chepurnoy Alexander","year":"2018","unstructured":"Alexander Chepurnoy, Charalampos Papamanthou, and Yupeng Zhang. 2018. Edrax: A Cryptocurrency with Stateless Transaction Validation. IACR Cryptol. ePrint Arch. (2018), 968. https:\/\/eprint.iacr.org\/2018\/968"},{"key":"e_1_3_2_1_10_1","unstructured":"Bitcoin Protocol documentation. 2021. https:\/\/en.bitcoin.it\/wiki\/Protocol_documentation"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_13_1","volume-title":"Proof-of-Stake Sidechains. In Proceedings of the Symposium on Security and Privacy (S&P). IEEE, 139-156","author":"Ga\u017ei Peter","year":"2019","unstructured":"Peter Ga\u017ei, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-Stake Sidechains. In Proceedings of the Symposium on Security and Privacy (S&P). IEEE, 139-156."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS60354.2023.00027"},{"key":"e_1_3_2_1_16_1","unstructured":"Thaddeus Dryja Joseph Poon. 2016. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy (MARBLE). Springer, 77-91","author":"Karantias Kostis","year":"2019","unstructured":"Kostis Karantias, Aggelos Kiayias, and Dionysis Zindros. 2019. Compact Storage of Superblocks for NIPoPoW Applications. In Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy (MARBLE). Springer, 77-91."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2013.06.005"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484784"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00031"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_27"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480999"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS59668.2023.10317023"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073270"},{"key":"e_1_3_2_1_25_1","volume-title":"Technical Report: Mining in Logarithmic Space with Variable Difficulty.","author":"Miller Lo\u00efc","year":"2025","unstructured":"Lo\u00efc Miller, Dorian Pacaud, Nathanael Derousseaux, Emmanuelle Anceaume, and Romaric Ludinard. 2025. Technical Report: Mining in Logarithmic Space with Variable Difficulty. (2025). https:\/\/cnrs.hal.science\/view\/index\/docid\/5138795 working paper or preprint."},{"key":"e_1_3_2_1_26_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_27_1","volume-title":"Liquid: A Bitcoin Sidechain. https:\/\/blockstream.com\/assets\/downloads\/pdf\/liquid-whitepaper.pdf","author":"Nick Jonas","year":"2020","unstructured":"Jonas Nick, Andrew Poelstra, and Gregory Sanders. 2020. Liquid: A Bitcoin Sidechain. https:\/\/blockstream.com\/assets\/downloads\/pdf\/liquid-whitepaper.pdf"},{"key":"e_1_3_2_1_28_1","volume-title":"An Explanation of Nakamoto's Analysis of Double-spend Attacks. CoRR","author":"Pinar Ozisik A.","year":"2017","unstructured":"A. Pinar Ozisik and Brian Neil Levine. 2017. An Explanation of Nakamoto's Analysis of Double-spend Attacks. CoRR, Vol. abs\/1701.03977 (2017). http:\/\/arxiv.org\/abs\/1701.03977"},{"key":"e_1_3_2_1_29_1","unstructured":"SNAP. 2020. Ethereum Snapshot Protocol. https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/caps\/snap.md"},{"key":"e_1_3_2_1_30_1","volume-title":"Knottenbelt","author":"Zamyatin Alexei","year":"2018","unstructured":"Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, and William J. Knottenbelt. 2018. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). In Proceedings of the Financial Cryptography and Data Security Conference (FC). Springer."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:50Z","timestamp":1766441870000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":30,"alternative-id":["10.1145\/3719027.3744874","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744874","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}