


@inproceedings{bitcoinLedger,
  title={Bitcoin as a transaction ledger: A composable treatment},
  author={Badertscher, Christian and Maurer, Ueli and Tschudi, Daniel and Zikas, Vassilis},
  booktitle={Annual International Cryptology Conference},
  pages={324--356},
  year={2017},
  organization={Springer}
}

@inproceedings{guc,
  title={Universally composable security with global setup},
  author={Canetti, Ran and Dodis, Yevgeniy and Pass, Rafael and Walfish, Shabsi},
  booktitle={Theory of Cryptography Conference},
  pages={61--85},
  year={2007},
  organization={Springer}
}

@article{popoW,
  title={Non-Interactive Proofs of Proof-of-Work.},
  author={Kiayias, Aggelos and Miller, Andrew and Zindros, Dionysis},
  journal={IACR Cryptology ePrint Archive},
  volume={2017},
  number={963},
  pages={1--42},
  year={2017}
}

@article{truebit,
  title={A scalable verification solution for blockchains},
  author={Teutsch, Jason and Reitwie{\ss}ner, Christian},
  journal={URL: https://people. cs. uchicago. edu/teutsch/papers/truebit pdf},
  year={2017}
}

@inproceedings{praos,
  title={Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain},
  author={David, Bernardo and Ga{\v{z}}i, Peter and Kiayias, Aggelos and Russell, Alexander},
  booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
  pages={66--98},
  year={2018},
  organization={Springer}
}

@inproceedings{backbone,
	title={The bitcoin backbone protocol: Analysis and applications},
	author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
	booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
	pages={281--310},
	year={2015},
	organization={Springer}
}

@inproceedings{ouroboros,
	title={Ouroboros: A provably secure proof-of-stake blockchain protocol},
	author={Kiayias, Aggelos and Russell, Alexander and David, Bernardo and Oliynykov, Roman},
	booktitle={Annual International Cryptology Conference},
	pages={357--388},
	year={2017},
	organization={Springer}
}


@misc{canetti1,
	author = {Ran Canetti},
	title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols},
	howpublished = {Cryptology ePrint Archive, Report 2000/067},
	year = {2000},
	note = {\url{https://eprint.iacr.org/2000/067}},
}

@inproceedings{canetti2,
	title={Universally composable security: A new paradigm for cryptographic protocols},
	author={Canetti, Ran},
	booktitle={Proceedings 2001 IEEE International Conference on Cluster Computing},
	pages={136--145},
	year={2001},
	organization={IEEE}
}

@inproceedings{vrf,
	title={A verifiable random function with short proofs and keys},
	author={Dodis, Yevgeniy and Yampolskiy, Aleksandr},
	booktitle={International Workshop on Public Key Cryptography},
	pages={416--431},
	year={2005},
	organization={Springer}
}

@inproceedings{uctiming,
	title={A universally composable treatment of network time},
	author={Canetti, Ran and Hogan, Kyle and Malhotra, Aanchal and Varia, Mayank},
	booktitle={2017 IEEE 30th Computer Security Foundations Symposium (CSF)},
	pages={360--375},
	year={2017},
	organization={IEEE}
}

@inproceedings{genesis,
	title={Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability},
	author={Badertscher, Christian and Ga{\v{z}}i, Peter and Kiayias, Aggelos and Russell, Alexander and Zikas, Vassilis},
	booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
	pages={913--930},
	year={2018},
	organization={ACM}
}

@inproceedings{vrf,
	title={Verifiable random functions},
	author={Micali, Silvio and Rabin, Michael and Vadhan, Salil},
	booktitle={40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039)},
	pages={120--130},
	year={1999},
	organization={IEEE}
}

@inproceedings{poSpace2,
	title={Proofs of space: When space is of the essence},
	author={Ateniese, Giuseppe and Bonacina, Ilario and Faonio, Antonio and Galesi, Nicola},
	booktitle={International Conference on Security and Cryptography for Networks},
	pages={538--557},
	year={2014},
	organization={Springer}
}

@inproceedings{poSpace1,
	title={Proofs of space},
	author={Dziembowski, Stefan and Faust, Sebastian and Kolmogorov, Vladimir and Pietrzak, Krzysztof},
	booktitle={Annual Cryptology Conference},
	pages={585--605},
	year={2015},
	organization={Springer}
}

@inproceedings{poSpace3,
	title={Tight proofs of space and replication},
	author={Fisch, Ben},
	booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
	pages={324--348},
	year={2019},
	organization={Springer}
}

@misc{poa,
	title={Proof of Authority},
	note={\url{. https://github.com/paritytech/parity/wiki/Proof-of-Authority-Chains}}
	}

@inproceedings{sleepy,
	title={The sleepy model of consensus},
	author={Pass, Rafael and Shi, Elaine},
	booktitle={International Conference on the Theory and Application of Cryptology and Information Security},
	pages={380--409},
	year={2017},
	organization={Springer}
}

@article{snowwhite,
	title={Snow white: Robustly reconfigurable consensus and applications to provably secure proofs of stake},
	author={Daian, Phil and Pass, Rafael and Shi, Elaine},
	journal={Cryptology ePrint Archive},
	year={2017}
}

@article{dfinity,
	title={Dfinity technology overview series, consensus system},
	author={Hanke, Timo and Movahedi, Mahnush and Williams, Dominic},
	journal={arXiv preprint arXiv:1805.04548},
	year={2018}
}

@article{algorand1,
	title={Algorand},
	author={Chen, Jing and Micali, Silvio},
	journal={arXiv preprint arXiv:1607.01341},
	year={2016}
}

@inproceedings{algorand2,
	title={Algorand: Scaling byzantine agreements for cryptocurrencies},
	author={Gilad, Yossi and Hemo, Rotem and Micali, Silvio and Vlachos, Georgios and Zeldovich, Nickolai},
	booktitle={Proceedings of the 26th Symposium on Operating Systems Principles},
	pages={51--68},
	year={2017},
	organization={ACM}
}

@misc{refrate,
title = {Second (s or sec)}
url = {https://whatis.techtarget.com/definition/second-s-or-sec}
}

@misc{chronos,
    author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas},
    title = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake},
    howpublished = {Cryptology ePrint Archive, Report 2019/838},
    year = {2019},
    note = {\url{https://eprint.iacr.org/2019/838}},
}

@article{sync1,
	title={Fine-grained network time synchronization using reference broadcasts},
	author={Elson, Jeremy and Girod, Lewis and Estrin, Deborah},
	journal={ACM SIGOPS Operating Systems Review},
	volume={36},
	number={SI},
	pages={147--163},
	year={2002},
	publisher={ACM}
}

@inproceedings{sync2,
	title={Timing-sync protocol for sensor networks},
	author={Ganeriwal, Saurabh and Kumar, Ram and Srivastava, Mani B},
	booktitle={Proceedings of the 1st international conference on Embedded networked sensor systems},
	pages={138--149},
	year={2003},
	organization={ACM}
}

@inproceedings{sync3,
	title={The flooding time synchronization protocol},
	author={Mar{\'o}ti, Mikl{\'o}s and Kusy, Branislav and Simon, Gyula and L{\'e}deczi, {\'A}kos},
	booktitle={Proceedings of the 2nd international conference on Embedded networked sensor systems},
	pages={39--49},
	year={2004},
	organization={ACM}
}

@article{consClock1,
	title={Consensus clock synchronization for wireless sensor networks},
	author={Maggs, Michael Kevin and O'keefe, Steven G and Thiel, David Victor},
	journal={IEEE sensors Journal},
	volume={12},
	number={6},
	pages={2269--2277},
	year={2012},
	publisher={IEEE}
}

@article{consClock2,
	title={Average timesynch: A consensus-based protocol for clock synchronization in wireless sensor networks},
	author={Schenato, Luca and Fiorentin, Federico},
	journal={Automatica},
	volume={47},
	number={9},
	pages={1878--1886},
	year={2011},
	publisher={Elsevier}
}
@article{consClock3,
	title={Time synchronization in WSNs: A maximum-value-based consensus approach},
	author={He, Jianping and Cheng, Peng and Shi, Ling and Chen, Jiming and Sun, Youxian},
	journal={IEEE Transactions on Automatic Control},
	volume={59},
	number={3},
	pages={660--675},
	year={2013},
	publisher={IEEE}
}

@article{consClock4,
	title={A distributed consensus-based clock synchronization protocol for wireless sensor networks},
	author={Aissaoua, Habib and Aliouat, Makhlouf and Bounceur, Ahc{\`e}ne and Euler, Reinhardt},
	journal={Wireless Personal Communications},
	volume={95},
	number={4},
	pages={4579--4600},
	year={2017},
	publisher={Springer}
}
@inproceedings{sync4,
	title={Gradient clock synchronization in wireless sensor networks},
	author={Sommer, Philipp and Wattenhofer, Roger},
	booktitle={Proceedings of the 2009 International Conference on Information Processing in Sensor Networks},
	pages={37--48},
	year={2009},
	organization={IEEE Computer Society}
}

@article{sync5,
	title={PulseSync: An efficient and scalable clock synchronization protocol},
	author={Lenzen, Christoph and Sommer, Philipp and Wattenhofer, Roger},
	journal={IEEE/ACM Transactions on Networking (TON)},
	volume={23},
	number={3},
	pages={717--727},
	year={2015},
	publisher={IEEE Press}
}

@inproceedings{consClock5,
	title={Firefly-inspired sensor network synchronicity with realistic radio effects},
	author={Werner-Allen, Geoffrey and Tewari, Geetika and Patel, Ankit and Welsh, Matt and Nagpal, Radhika},
	booktitle={Proceedings of the 3rd international conference on Embedded networked sensor systems},
	pages={142--153},
	year={2005},
	organization={ACM}
}
@inproceedings{consClock6,
	title={A new distributed time synchronization protocol for multihop wireless networks},
	author={Solis, Roberto and Borkar, Vivek S and Kumar, PR},
	booktitle={Proceedings of the 45th IEEE Conference on Decision and Control},
	pages={2734--2739},
	year={2006},
	organization={IEEE}
}

@article{consClock7,
	title={Fully distributed clock synchronization in wireless sensor networks under exponential delays},
	author={Luo, Bin and Cheng, Lei and Wu, Yik-Chung},
	journal={Signal Processing},
	volume={125},
	pages={261--273},
	year={2016},
	publisher={Elsevier}
}

@article{polkadot,
	title={Polkadot: Vision for a heterogeneous multi-chain framework},
	author={Wood, Gavin},
	journal={White Paper},
	year={2016}
}

@article{erasure1,
  title={Fraud proofs: Maximising light client security and scaling blockchains with dishonest majorities},
  author={Al-Bassam, Mustafa and Sonnino, Alberto and Buterin, Vitalik},
  journal={arXiv preprint arXiv:1809.09044},
  year={2018}
}

@article{erasure2,
  title={Coded Merkle Tree: Solving Data Availability Attacks in Blockchains},
  author={Yu, Mingchao and Sahraei, Saeid and Li, Songze and Avestimehr, Salman and Kannan, Sreeram and Viswanath, Pramod},
  journal={arXiv preprint arXiv:1910.01247},
  year={2019}
}

