

@inproceedings{bitcoinLedger,
  title={Bitcoin as a transaction ledger: A composable treatment},
  author={Badertscher, Christian and Maurer, Ueli and Tschudi, Daniel and Zikas, Vassilis},
  booktitle={Annual International Cryptology Conference},
  pages={324--356},
  year={2017},
  organization={Springer}
}

@inproceedings{guc,
  title={Universally composable security with global setup},
  author={Canetti, Ran and Dodis, Yevgeniy and Pass, Rafael and Walfish, Shabsi},
  booktitle={Theory of Cryptography Conference},
  pages={61--85},
  year={2007},
  organization={Springer}
}

@article{popoW,
  title={Non-Interactive Proofs of Proof-of-Work.},
  author={Kiayias, Aggelos and Miller, Andrew and Zindros, Dionysis},
  journal={IACR Cryptology ePrint Archive},
  volume={2017},
  number={963},
  pages={1--42},
  year={2017}
}

@article{truebit,
  title={A scalable verification solution for blockchains},
  author={Teutsch, Jason and Reitwie{\ss}ner, Christian},
  journal={URL: https://people. cs. uchicago. edu/teutsch/papers/truebit pdf},
  year={2017}
}

@inproceedings{ouroboros,
	title={Ouroboros: A provably secure proof-of-stake blockchain protocol},
	author={Kiayias, Aggelos and Russell, Alexander and David, Bernardo and Oliynykov, Roman},
	booktitle={Annual International Cryptology Conference},
	pages={357--388},
	year={2017},
	organization={Springer}
}


@misc{canetti1,
	author = {Ran Canetti},
	title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols},
	howpublished = {Cryptology ePrint Archive, Report 2000/067},
	year = {2000},
	note = {\url{https://eprint.iacr.org/2000/067}},
}

@inproceedings{canetti2,
	title={Universally composable security: A new paradigm for cryptographic protocols},
	author={Canetti, Ran},
	booktitle={Proceedings 2001 IEEE International Conference on Cluster Computing},
	pages={136--145},
	year={2001},
	organization={IEEE}
}

@inproceedings{uctiming,
	title={A universally composable treatment of network time},
	author={Canetti, Ran and Hogan, Kyle and Malhotra, Aanchal and Varia, Mayank},
	booktitle={2017 IEEE 30th Computer Security Foundations Symposium (CSF)},
	pages={360--375},
	year={2017},
	organization={IEEE}
}

@inproceedings{genesis,
	title={Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability},
	author={Badertscher, Christian and Ga{\v{z}}i, Peter and Kiayias, Aggelos and Russell, Alexander and Zikas, Vassilis},
	booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
	pages={913--930},
	year={2018},
	organization={ACM}
}

@inproceedings{vrf,
	title={Verifiable random functions},
	author={Micali, Silvio and Rabin, Michael and Vadhan, Salil},
	booktitle={40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039)},
	pages={120--130},
	year={1999},
	organization={IEEE}
}

@inproceedings{poSpace2,
	title={Proofs of space: When space is of the essence},
	author={Ateniese, Giuseppe and Bonacina, Ilario and Faonio, Antonio and Galesi, Nicola},
	booktitle={International Conference on Security and Cryptography for Networks},
	pages={538--557},
	year={2014},
	organization={Springer}
}

@inproceedings{poSpace1,
	title={Proofs of space},
	author={Dziembowski, Stefan and Faust, Sebastian and Kolmogorov, Vladimir and Pietrzak, Krzysztof},
	booktitle={Annual Cryptology Conference},
	pages={585--605},
	year={2015},
	organization={Springer}
}

@inproceedings{poSpace3,
	title={Tight proofs of space and replication},
	author={Fisch, Ben},
	booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
	pages={324--348},
	year={2019},
	organization={Springer}
}

@misc{poa,
	title={Proof of Authority},
	note={\url{. https://github.com/paritytech/parity/wiki/Proof-of-Authority-Chains}}
	}

@inproceedings{sleepy,
	title={The sleepy model of consensus},
	author={Pass, Rafael and Shi, Elaine},
	booktitle={International Conference on the Theory and Application of Cryptology and Information Security},
	pages={380--409},
	year={2017},
	organization={Springer}
}

@article{snowwhite,
	title={Snow white: Robustly reconfigurable consensus and applications to provably secure proofs of stake},
	author={Daian, Phil and Pass, Rafael and Shi, Elaine},
	journal={Cryptology ePrint Archive},
	year={2017}
}

@article{dfinity,
	title={Dfinity technology overview series, consensus system},
	author={Hanke, Timo and Movahedi, Mahnush and Williams, Dominic},
	journal={arXiv preprint arXiv:1805.04548},
	year={2018}
}

@article{algorand1,
	title={Algorand},
	author={Chen, Jing and Micali, Silvio},
	journal={arXiv preprint arXiv:1607.01341},
	year={2016}
}

@inproceedings{algorand2,
	title={Algorand: Scaling byzantine agreements for cryptocurrencies},
	author={Gilad, Yossi and Hemo, Rotem and Micali, Silvio and Vlachos, Georgios and Zeldovich, Nickolai},
	booktitle={Proceedings of the 26th Symposium on Operating Systems Principles},
	pages={51--68},
	year={2017},
	organization={ACM}
}

@misc{refrate,
title = {Second (s or sec)},
url = {https://whatis.techtarget.com/definition/second-s-or-sec}
}
