tanglescout::Reader()
// Extensive advanced documentation
IOTA / Tangle Research
'The first glance at the simulation of the Tangle: discrete model'
Bartosz Kusmierz
2017
Analyses different tip selection mechanisms and their comulative weight progression and tips number stability.
'Extracting Tangle Properties in Continuous Time via Large-Scale Simulations'
Bartosz Kusmierz, Philip Staupe
2018
Same as Bartosz Kusmierz (2017), but a lot more extensive and over a continuous time model (which is more realistic).
'Probability of being left behind and probability of becoming permanent tip in the Tangle'
Bartosz Kusmierz, Alon Gal
2018
"We formalize, analyze and numerically estimate probability that given transaction will be left behind and probability that transaction will become permanent tip."
'Improving the Anonymity of the IOTA Cryptocurrency'
Laurence Tennant
2017
Assesses the applicability of privacy-improving methods currently used by other cryptocurrencies to IOTA.
'Quasi-Analytic Parasite Chain Absorption Probabilities in the Tangle'
Philip Staupe
2017
Analyses and simulates with which probability the MCMC random walk gets absorbed into a parasite chain.
'The Stability and the Security of the Tangle'
Quentin Bramas
2018
'The Tangle'
Serguei Popov
2018
The original IOTA whitepaper. Presents the Tangle structure, inner workings as well as possible attack scenarios.
'Local modifiers in the Tangle'
Serguei Popov
2018
Introduces local modifiers that allow different nodes to interact with the Tangle in different ways, depending on information locally available to them.
'On the timestamps in the tangle'
Serguei Popov
2018
Concludes that while it is impossible to establish correct time order of Tangle transactions, confidence intervals for timestamps can be reasonably accurate.
'Equilibria in the Tangle'
Serguei Popov, Olivia Saa, Paulo Finardi
2018
Proves existence of Nash equilibria for the Tangle when a part of players tries to optimize their attachment strategies.
Other Consensus Mechanisms
'Helium'
Amir Haleem, Andrew Allen, Andrew Thompson, Marc Nijdam, Rahul Garg
2018
A decentralized (IoT) machine network with intrinsic blockchain.
'DEXON Consensus Algorithm'
DEXON Foundation
2018
Presents the "Infinitely Scalable, Low-Latency Byzantine Fault Tolerant Blocklattice" DEXON Consensus Algorithm.
'Hedera: A Governing Council & Public Hashgraph Network'
Leemon Baird, Mance Harmon, Paul Madsen
2018
Open, fast, fair and decentralized public ledger built on the Hedera Hashgraph consensus algorithm.
'Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC)'
Pierre Chevalier, Bartlomiej Kaminski, Fraser Hutchison, Qi Ma, Spandan Sharma
2018
'SPECTRE'
Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
2016
Partial synchronous consensus mechanism.
Trinity
'Security Review IOTA Wallet "TRINITY"'
accessec GmbH - Sebastian Rohr, Iratxe Garrido, Janis Kinast
2018
"Only very few weaknesses were found across the platforms, and none of them was dubbed critical".
'STRIDE/DREAD Analysis - Threat Modelling of Trinity Wallet'
Cybersecurity Lab - M. Masoom Alam
2018
Demonstrates that the IOTA Foundation and the Trinity team have taken considerable measures for hardening the security of the Trinity wallet.
Research on Sybil Attacks
'The Sybil Attack in Sensor Networks: Analysis & Defenses'
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig
2004
Presents mechanisms to detect and prevent sybil attacks in a decentralized (sensor) network with (nearly) no added costs.
'Detecting the Sybil Attack in Mobile Ad hoc Networks'
Chris Piro, Clay Shields, Brian Neil Levine
2006
Presents the first completely passive approach to detecting a Sybil attacker in a network by using monitoring nodes.
DCI claims
'A Cryptanalysis of IOTA’s Curl Hash Function'
Michael Colavita, Garrett Tanzer
2018
Rumination of DCI claims.
'Leaked Email Chain between IOTA Foundation and DCI'
Sergey Ivancheglo et al.
2017
Other
'Technical Analysis of the Tangle in the IOTA-Environment'
Bennet Breier
2017
Bachelor's Thesis providing a general overview over the Tangle.
'A Guided Tour Puzzle for Denial of Service Prevention'
Mehmud Abliz, Taieb Znati
2009
Introduces an alternative cryptographic puzzle scheme, guided tour puzzles.