no code implementations • 1 Feb 2021 • Suryanarayana Sankagiri, Shreyas Gandlur, Bruce Hajek
We analyze the performance of the longest-chain protocol under the assumption that the communication delays are random, independent, and identically distributed.
Cryptography and Security Distributed, Parallel, and Cluster Computing