A Crictal Review of Cryptocurrency Systems
Abstract:
Adoption of Cryptocurrency has grown
significantly over the time and becoming more popular among young generation. People
are calling it currency of new digital era. In this research work we are reviewing
the dominant Cryptocurrency systems and its underlying disruptive Innovations and
Technologies.
References:
[1]. Back, A. (2002, 8 1). Hashcash- A Denial of
Service Counter-Measu. Retrieved 4 25, 2017, from hashcash.org: http://www.hashcash.org/papers/hashcash.pdf.
[2]. Becker, J., Breuker, D., Heide, T., Holler,
J., Rauer, H. P., & Böhme, R. (2013). Can We Afford Integrity by
Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. The Economics of
Information Security and Privacy, 135-156.
doi:https://doi.org/10.1007/978-3-642-39498-0_7.
[3]. Dadda, L., Macchetti, M., & Owen, J.
(2004). The design of a high speed ASIC unit for the hash function SHA-256
(384, 512). Proceedings Design, Automation and Test in Europe Conference and
Exhibition (pp. 70-75). IEEE.
[4]. Dai, W. (2017, 04 10). B-money. Retrieved
from weidai.com: http://www.weidai.com/bmoney.txt
[5]. Eastlake 3rd, D., & Jones, P. (2001).
US secure hash algorithm 1 (SHA1). (No. RFC 3174).
[6]. FCIC. (2011). FINAL REPORT OF THE NATIONAL
COMMISSION ON THE CAUSES OF THE FINANCIAL AND ECONOMIC CRISIS IN THE UNITED
STATES. THE FINANCIAL CRISIS INQUIRY COMMISSION. Retrieved 04 05, 2017, from http://fcic-static.law.stanford.edu/cdn_media/fcic-reports/fcic_final_report_full.pdf.
[7]. FCIC. (2017, 04 22). History of the
commission. Retrieved from Cybercemetery. unt.edu's Archive: https://cybercemetery.unt.edu/archive/fcic/20110310173617/http://www.fcic.gov/about.
[8]. Finney, H. (2005). RPOW: Reusable Proofs of
Work. CodeCon.
[9]. iota.readme.io. (2015). IOTA Introduction.
Retrieved 05 22, 2017, from iota.readme.io: https://iota.readme.io/v1.2.0/docs.
[10]. King, S., & Nadal, S. (2012). PPCoin:
Peer-to-Peer Crypto-Currency with Proof-of-Stake. Peercoin.net Whitepaper, 1-6.
Retrieved 06 05, 2017, from
https://peercoin.net/assets/paper/peercoin-paper.pdf.
[11]. Michael, C., Pattanayak, P., Verma, S.,
& Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied
Innovation 2, (pp. 6-10).
[12]. Nakamoto, S. (2008). Bitcoin: A
Peer-to-Peer Electronic Cash System. bitcoin.org. Retrieved 04 20, 2017, from https://bitcoin.org/bitcoin.pdf.
[13]. Peck, M. (2012, 05 30). Bitcoin: The
Cryptoanarchists’ Answer to Cash. Retrieved from spectrum.ieee.org: https://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cash/0.
[14]. Percival, C., & Josefsson, S. (2016,
07). The scrypt Password-Based Key Derivation Function. Internet Engineering
Task Force (IETF). Retrieved 03 25, 2017, from https://tools.ietf.org/html/rfc7914.
[15]. Popov, S. (2014). The tangle. IOTA
Whitepaper, 1-25. Retrieved 04 05, 2017, from iota.org: http://iota.org/IOTA_Whitepaper.pdf.
[16]. Popov, S. (2017). The Tangle. Version 1.2,
1-28. Retrieved 04 05, 2017, from https://www.docdroid.net/mWTNlgd/iota1-2.pdf.
[17]. Ripple.com. (N.D.). Product Overview.
Retrieved 05 13, 2017, from Ripple.com: https://ripple.com/files/ripple_product_overview.pdf.
[18]. Ripple.com. (N.D.). Solution Overview.
Retrieved 05 04, 2017, from ripple.com: https://ripple.com/files/ripple_solutions_guide.pdf.
[19]. Szabo, N. (2008, 12 07). Bit gold.
Retrieved 04 02, 2017, from unenumerated.blogspot.com: https://unenumerated.blogspot.com/2005/12/bit-gold.html.
[20]. Tangleblog.com. (2015). IOTA- what is it,
who is it? Retrieved 05 04, 2017, from tangleblog.com: http://www.tangleblog.com/what-is-iota-what-is-the-tangle/.
[21]. Thomas, S., & Schwartz, E. (2015). A
Protocol for Interledger Payments. Retrieved 05 03, 2017, from interledger.org:
https://interledger.org/interledger.pdf.
[22]. Williams, M. (2010). Uncontrolled Risk.
McGraw-Hill Education.