Skip to content

Latest commit

 

History

History
100 lines (48 loc) · 11.5 KB

references.md

File metadata and controls

100 lines (48 loc) · 11.5 KB

References

[1] Goode, L. Messenger and WhatsApp process 60 billion messages a day, three times more than SMS. The Verge. URL: https://www.theverge.com/2016/4/12/11415198/facebook-messenger-whatsapp-number-messages-vs-sms-f8-2016. Accessed, 2018-09-29.

[2] Follow the leaders: highest ranking Apps in Google Play Store, United States. SimilarWeb. URL: https://www.similarweb.com/apps/top/google/app-index/us/all/top-free. Accessed, 29-Sep-2018.

[4] Wu F, Chen T, Zhong S, Li L, Yang R. (2008). Incentive-compatible opportunistic routing for wireless networks. In Proceedings of the 14th ACM international conference on Mobile computing and networking (MobiCom '08). ACM, New York, NY, USA, 303-314.

[5] Marti S, Giuli TJ, Lai K., Baker M (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom '00). ACM, New York, NY, USA, 255-265.

[6] uncorrelated, “A very rough draft of a new Hocnet Whitepaper • r/hocnet,” reddit. URL: https://old.reddit.com/r/hocnet/comments/204kma/a_very_rough_draft_of_a_new_hocnet_whitepaper/. Accessed, 29-Sep-2018.

[7] Nakamoto, S (2009). Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https://metzdowd.com. URL: https://bitcoin.org/bitcoin.pdf Accessed, 29-Sep-2018.

[8] Open Libernet [DRAFT] (2015). URL: http://www.openlibernet.org/paper/open-libernet.pdf. Accessed, 15-Aug-2018.

[9] Croman K, Decker C, Eyal I, Gencer A, Juels A, Kosba A, Miller A, Saxena P, Shi E, Gün Sirer E, Song D, Wattenhofer R (2016). On Scaling Decentralized Blockchains. In: Clark J., Meiklejohn S., Ryan P., Wallach D., Brenner M., Rohloff K. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science, vol 9604. Springer, Berlin, Heidelberg.

[10] Bitcoin Wiki. Contracts: Example 7: Rapidly-adjusted (micro)payments to a pre-determined party. URL: https://en.bitcoin.it/wiki/Contracts#Example_7:_Rapidly-adjusted_.28micro.29payments_to_a_pre-determined_party. Accessed, 29-Sep-2018.

[11] bitcoinj. Working with micropayment channels. URL: https://bitcoinj.github.io/working-with-micropayments. Accessed, 29-Sep-2018.

[12] Poon J, Dryja T (2015): The bitcoin lightning network. URL: https://lightning.network/lightning-network-paper.pdf. Accessed, 29-Sep-2018.

[13] Tremback J, Kilpatrick J (2017). Althea: An incentivized mesh network protocol. URL: https://altheamesh.com/documents/whitepaper.pdf. Accessed, 29-Sep-2018.

[14] Ernst J, Wang Z, Abraham S, Lyotier J, Jensen C, Quinn M, D’Souza A (2017). Decentralized Mobile Mesh Networking Platform Using Blockchain Technology and Tokenization. URL: https://www.rightmesh.io/docs/RightMeshTechnicalWhitepaper3.1.pdf. Accessed, 29-Sep-2018.

[15] Frangoudis P, Polyzos G (2011). Wireless Community Networks: An Alternative Approach for Nomadic Broadband Network Access. Communications Magazine, IEEE. 49. 206 - 213.

[16] Boneh D, Gentry C, Lynn B, Shacham H (2003). A Survey of Two Signature Aggregation Techniques. CryptoBytes. 6.

[17] Wuille P. bip-schnorr.mediawiki. URL: https://github.com/sipa/bips/blob/bip-schnorr/bip-schnorr.mediawiki. Accessed, 29-Sep-2018.

[18] Maxwell G, Poelstra A, Seurin Y,Wuille P (2018). Simple Schnorr Multi-Signatures with Applications to Bitcoin. IACR Cryptology ePrint Archive 2018: 68 (2018).

[19] Dryja T. [bitcoin-dev] Per-block non-interactive Schnorr signature aggregation. URL: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2017-May/014272.html. Accessed, 29-Sep-2018.

[21] Chia BLS Signatures implementation. URL: https://github.com/Chia-Network/bls-signatures. Accessed, 29-Sep-2018.

[22] Boneh D, Drijvers M, Neven G (2018). Compact Multi-Signatures for Smaller Blockchains. IACR Cryptology ePrint Archive 2018: 483 (2018).

[23] Boneh D, Gentry C, Lynn B, Shacham H (2003). Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham E. (eds) Advances in Cryptology — EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol 2656. Springer, Berlin, Heidelberg.

[24] Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R (2008). NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone R. (eds) Wireless Sensor Networks. EWSN 2008. Lecture Notes in Computer Science, vol 4913. Springer, Berlin, Heidelberg.

[25] Decker C, Russell R, Osuntokun O (2018). eltoo: A Simple Layer2 Protocol for Bitcoin. https://blockstream.com/eltoo.pdf. Accessed, 29-Sep-2018.

[26] Maxwell G (2011). Deterministic wallets. URL: https://bitcointalk.org/index.php?topic=19137.0. Accessed, 29-Sep-2018.

[27] Wuille P. BIP-32, Hierarchical Deterministic Wallets. URL: https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki. Accessed, 29-Sep-2018.

[28] Szabo N (2017). Money, blockchains, and social scalability. URL: http://unenumerated.blogspot.com/2017/02/money-blockchains-and-social-scalability.html. Accessed, 29-Sep-2018.

[29] findbl0k. Bitcoin Uptime. URL: http://bitcoinuptime.com Accessed, 29-Sep-2018.

[30] The MIT Digital Currency Initiative. watchtower - watch channels for fraudulent transactions. URL: https://github.com/mit-dci/lit/tree/master/watchtower. Accessed, 29-Sep-2018.

[31] Dryja T (2017). Unlinkable outsourced channel monitoring. Scaling Bitcoin 2017. Transcribed by Bryan Bishop (kanzure). URL: https://diyhpl.us/wiki/transcripts/scalingbitcoin/milan/unlinkable-outsourced-channel-monitoring

[32] Herlihy M. (2018). Atomic Cross-Chain Swaps. URL: http://arxiv. org/abs/1801.09515. White Paper. Accessed, 2018-08-29.

[33] Perkins C, Royer E (2000). The ad hoc on-demand distance vector protocol. In: Ad hoc Networking, Addison-Wesley, pp. 173–219, 2000.

[34] NS-3. URL: http://www.nsnam.orgl. Accessed, 2018-08-01.

[35] Burchert C, Decker C, Wattenhofer R (2017). Scalable Funding of Bitcoin Micropayment Channel Networks. In: Spirakis P., Tsigas P. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2017. Lecture Notes in Computer Science, vol 10616. Springer, Cham.

[36] Gentry C, Ramzan Z (2006). Identity-Based Aggregate Signatures. In: Yung M., Dodis Y., Kiayias A., Malkin T. (eds) Public Key Cryptography - PKC 2006. PKC 2006. Lecture Notes in Computer Science, vol 3958. Springer, Berlin, Heidelberg.

[37] Osuntokun O, Akselrod A. BIP 158: Peer Services. URL: https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki. Accessed, 2018-04-13.

[38] Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, and Wuille P (2014). Enabling Blockchain Innovations with Pegged Sidechains. https://blockstream.com/sidechains.pdf. Accessed 12-Feb-2019.

[39] Wahby, R. and Boneh, D. (2019). Fast and simple constant-time hashing to the BLS12-381. elliptic curve. Cryptology ePrint Archive, Report 2019/403. ia.cr/2019/403. Accessed 23-Apr-2019.

[40] Snigirev, S. (2018). BLS signatures: better than Schnorr. Medium.com post. cryptoadvance/bls-signatures-better-than-schnorr-5a7fe30ea716. Access 23-Apr-2019.

[41] Discussion topic “HTLCs don't work for micropayments”? on StackOverflow.com . https://bitcoin.stackexchange.com/questions/85650/htlcs-dont-work-for-micropayments. Accessed 16-May-2019.

[42] Basis of Lightning Technology (BOLT) specification. Bolt #3. https://github.com/lightningnetwork/lightning-rfc/blob/master/03-transactions.md#trimmed-outputs. Accessed 2019-May-16.

[43] Decker C. bip-0118.mediawiki. URL: https://github.com/bitcoin/bips/blob/master/bip-0118.mediawiki. Accessed, 16-May-2019.

[44] Comte V. Insight #3: Running a Lightning enabled Point of Sale offline. URL: https://www.puzzle.ch/de/blog/articles/2018/11/21/takeaways-from-the-lightning-hackday-in-nyc. Accessed, 17-May-2019.

[45] Roasbeef. [WIP] multi: add new draft key send mode for spontaneous payments. URL: lightningnetwork/lnd#2455. Access, 29-May-2019.

[46] Dryja, T. (2019).Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set. Cryptology ePrint Archive, Report 2019/611. ia.cr/2019/611. Accessed 4-June-2019.

[47] Todd, P. (2017). Scalable Semi-Trustless Asset Transfer via Single-Use-Seals and Proof-of-Publication. URL: https://petertodd.org/2017/scalable-single-use-seal-asset-transfer#proof-of-publication-ledger. Accessed 4-June-2019.