Dec. 5, 2022, 2:10 a.m. | Mustafa Doger, Sennur Ulukus

cs.CR updates on arXiv.org arxiv.org

We improve security-latency bounds of Nakamoto consensus by analyzing the
race between adversarial and honest chains in three different phases:
pre-mining, confirmation and post-confirmation. We find the probability
distribution of the length of the adversarial chain and the rigged adversarial
chain under jumper models during the confirmation interval. We analyze certain
properties of this race to model pre-mining and post-confirmation phases with
random walks that provide tighter bounds than existing results. Combining all
three phases provides novel upper and lower …

bitcoin latency network security under

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US