1 "www.ccn.com/privacy-coin-verge-succumbsto-51-attack-again/"
2 "www.3.weforum.org/"
3 "https://www.coinhills.com/ko/market/exchange/"
4 Boyer, M., "Tight bounds on quantum searching" 46 (46): 493-505, 1998
5 Chen, L, "Report on post-quantum cryptography" National Institute of Standards and Technology 2016
6 Aggarwal, D, "Quantum attacks on Bitcoin, and how to protect against them"
7 Eyal, I., "Majority is not enough: Bitcoin mining is vulnerable" 61 (61): 95-102, 2018
8 Bonneau, Joseph, "Hostile blockchain takeovers" 2018
9 Nakamoto, Satoshi, "Bitcoin: A peer-to-peer electronic cash system"
10 Kwon, Y., "Be selfish and avoid dilemmas:Fork after withholding attacks on bitcoin" 195-209, 2017
1 "www.ccn.com/privacy-coin-verge-succumbsto-51-attack-again/"
2 "www.3.weforum.org/"
3 "https://www.coinhills.com/ko/market/exchange/"
4 Boyer, M., "Tight bounds on quantum searching" 46 (46): 493-505, 1998
5 Chen, L, "Report on post-quantum cryptography" National Institute of Standards and Technology 2016
6 Aggarwal, D, "Quantum attacks on Bitcoin, and how to protect against them"
7 Eyal, I., "Majority is not enough: Bitcoin mining is vulnerable" 61 (61): 95-102, 2018
8 Bonneau, Joseph, "Hostile blockchain takeovers" 2018
9 Nakamoto, Satoshi, "Bitcoin: A peer-to-peer electronic cash system"
10 Kwon, Y., "Be selfish and avoid dilemmas:Fork after withholding attacks on bitcoin" 195-209, 2017