|
[1] Nakamoto, Satoshi (2009). "Bitcoin: A Peer-to-Peer Electronic Cash System" [2] Genesis Block (Block #0), from: https://blockchain.info/block/000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f [3] Lamport, L.; Shostak, R.; Pease, M.(1982). "The Byzantine Generals Problem" [4] David Lee Chaum. "Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups." University of California, Berkeley, 1982. [5] V. Miller, "Use of elliptic curves in cryptography", CRYPTO 85, 1985. [6] Neal Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation 48, 1987. [7] Rivest, R.; Shamir, A.; Adleman, L. (February 1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" [8] Ethereum White Paper, from: https://github.com/ethereum/wiki/wiki/White-Paper/ [9] Solidity Docs, from: https://solidity.readthedocs.io/en/latest/
|