A Crictal Review of Cryptocurrency Systems

Download Article

DOI: 10.21522/TIJAR.2014.04.02.Art012

Authors : Mahendra Kumar Shrivas, Thomas Yeboah

Abstract:

Adoption of Cryptocurrency has grown significantly over the time and becoming more popular among young generation. People are calling it currency of new digital era. In this research work we are reviewing the dominant Cryptocurrency systems and its underlying disruptive Innovations and Technologies.

Keywords: Cryptocurrency, Blockchain, Digital Currency, Hashing, Proof of Work, Proof of Stake, Tangle, RippleNet, Bitcoin, Altcoins.

References:

[1]. Back, A. (2002, 8 1). Hashcash- A Denial of Service Counter-Measu. Retrieved 4 25, 2017, from hashcash.org: http://www.hashcash.org/papers/hashcash.pdf.

[2]. Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H. P., & Böhme, R. (2013). Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. The Economics of Information Security and Privacy, 135-156. doi:https://doi.org/10.1007/978-3-642-39498-0_7.

[3]. Dadda, L., Macchetti, M., & Owen, J. (2004). The design of a high speed ASIC unit for the hash function SHA-256 (384, 512). Proceedings Design, Automation and Test in Europe Conference and Exhibition (pp. 70-75). IEEE.

[4]. Dai, W. (2017, 04 10). B-money. Retrieved from weidai.com: http://www.weidai.com/bmoney.txt

[5]. Eastlake 3rd, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA1). (No. RFC 3174).

[6]. FCIC. (2011). FINAL REPORT OF THE NATIONAL COMMISSION ON THE CAUSES OF THE FINANCIAL AND ECONOMIC CRISIS IN THE UNITED STATES. THE FINANCIAL CRISIS INQUIRY COMMISSION. Retrieved 04 05, 2017, from http://fcic-static.law.stanford.edu/cdn_media/fcic-reports/fcic_final_report_full.pdf.

[7]. FCIC. (2017, 04 22). History of the commission. Retrieved from Cybercemetery. unt.edu's Archive: https://cybercemetery.unt.edu/archive/fcic/20110310173617/http://www.fcic.gov/about.

[8]. Finney, H. (2005). RPOW: Reusable Proofs of Work. CodeCon.

[9]. iota.readme.io. (2015). IOTA Introduction. Retrieved 05 22, 2017, from iota.readme.io: https://iota.readme.io/v1.2.0/docs.

[10].  King, S., & Nadal, S. (2012). PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Peercoin.net Whitepaper, 1-6. Retrieved 06 05, 2017, from https://peercoin.net/assets/paper/peercoin-paper.pdf.

[11].  Michael, C., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation 2, (pp. 6-10).

[12].  Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. bitcoin.org. Retrieved 04 20, 2017, from https://bitcoin.org/bitcoin.pdf.

[13].  Peck, M. (2012, 05 30). Bitcoin: The Cryptoanarchists’ Answer to Cash. Retrieved from spectrum.ieee.org: https://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answer-to-cash/0.

[14].  Percival, C., & Josefsson, S. (2016, 07). The scrypt Password-Based Key Derivation Function. Internet Engineering Task Force (IETF). Retrieved 03 25, 2017, from https://tools.ietf.org/html/rfc7914.

[15].  Popov, S. (2014). The tangle. IOTA Whitepaper, 1-25. Retrieved 04 05, 2017, from iota.org: http://iota.org/IOTA_Whitepaper.pdf.

[16].  Popov, S. (2017). The Tangle. Version 1.2, 1-28. Retrieved 04 05, 2017, from https://www.docdroid.net/mWTNlgd/iota1-2.pdf.

[17].  Ripple.com. (N.D.). Product Overview. Retrieved 05 13, 2017, from Ripple.com: https://ripple.com/files/ripple_product_overview.pdf.

[18].  Ripple.com. (N.D.). Solution Overview. Retrieved 05 04, 2017, from ripple.com: https://ripple.com/files/ripple_solutions_guide.pdf.

[19].  Szabo, N. (2008, 12 07). Bit gold. Retrieved 04 02, 2017, from unenumerated.blogspot.com: https://unenumerated.blogspot.com/2005/12/bit-gold.html.

[20].  Tangleblog.com. (2015). IOTA- what is it, who is it? Retrieved 05 04, 2017, from tangleblog.com: http://www.tangleblog.com/what-is-iota-what-is-the-tangle/.

[21].  Thomas, S., & Schwartz, E. (2015). A Protocol for Interledger Payments. Retrieved 05 03, 2017, from interledger.org: https://interledger.org/interledger.pdf.

[22].  Williams, M. (2010). Uncontrolled Risk. McGraw-Hill Education.