Long-Range Attacks: The Serious Problem With Adaptive Proof of Work

E
By Ethereum Foundation Blog
View Original

Article Summary

Our current proof of work design, blockchain-based proof of work, is the second iteration of our attempt to create a mining algorithm that is guaranteed to remain CPU-friendly and resistant to optimization by specialized hardware (ASICs) in the long term. Our first attempt, Dagger, tried to take the idea of...

Read the Full Article

This is a summary from our news feed. For the complete article with full details, analysis, and additional content, visit the original source.

Read Full Article on Ethereum Foundation Blog

About This Story

Published:May 15, 2014 at 09:45 AM
Source:Ethereum Foundation Blog
Category:Crypto
Reading Time:~2 min on source

Related Articles

More stories from Crypto