Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.


Links to the best whitepapers from the cryptocurrency space.

2/ 3
CacheOut: Leaking Data on Intel CPUs via Cache Evictions

"In this work we present CacheOut, a new microarchitectural attack that is capable of bypassing Intel’s buffer overwrite countermeasures."

2/ 3
Blockchain and the evolution of institutional technologies: Implications for innovation policy

"For the past century economists have proposed a suite of theories relating to industrial dynamics, technological change and innovation. There has been an implication in these models that the institutional environment is stable. However, a new class of institutional technologies—most notably blockchain technology—lower the cost of institutional entrepreneurship along these margins, propelling a process of institutional evolution."

2/ 3
Platform Tokenization: Financing, Governance, and Moral Hazard

"The paper shows that platform tokenization can alleviate underprovision of non-contractible entrepreneurial effort."

2/ 3
Blockchain-Based Corporate Governance

"Corporations and other forms of business organizations can be supplemented with blockchain-based agency constructs. Blockchain-based decentralized autonomous organizations (DAOs) expand the definition of the firm. On-chain DAO governance enables dynamic regulatory features that facilitate unprecedented decentralized regulatory solutions."

2/ 3
Here's Google "Quantum Supremacy" paper it pulled from NASA's website

"Google’s ‘Sycamore’ quantum computer was able to achieve “quantum supremacy” — solving a complex problem that would otherwise be impossible for a classical computer to solve in its lifetime — in just three minutes and 20 seconds, compared to the estimated 10,000 years it would take the world’s most advanced classical computer, Summit."

2/ 3
Scalable Byzantine Reliable Broadcast (Extended Version)

"Existing broadcast protocols for this setting scale poorly, as they typically build on quorum systems with strong intersection guarantees, which results in linear per-process communication and computation complexity."

2/ 3
Headless Brands

"We introduce the concept of headless brands to explain the community-driven brand dynamics of projects which have no centralized managerial body. We describe some elements of a headless brand's lifecycle, from formation to adoption, and suggest strategies to maintain a brand's coherence."

2/ 3
Embedded supervision: how to build regulation into blockchain finance

"How might blockchain-based financial markets be regulated and supervised? This paper argues that asset tokenisation and underlying distributed ledger technology (DLT) open up new ways of supervising financial risks. It then puts the case for "embedded supervision", ie a framework that allows compliance with regulatory goals to be automatically monitored by reading the market's ledger, thus reducing the need for firms to actively collect, verify and deliver data."

1/ 3
Why Do Public Blockchains Need Formal and Effective Internal Governance Mechanisms?

"With the birth and rise of cryptocurrencies following the success of Bitcoin and the popularity of 'Initial Coin Offerings,' public awareness of blockchain technologies has substantially increased in recent years. Many blockchain advocates claim that these software artefacts enable radically new forms of decentralised governance by relying upon computational trust created via cryptographic proof, obviating the need for reliance on conventional trusted third-party intermediaries."

2/ 3
The Yield Protocol: On-Chain Lending With Interest Rate Discovery

"This paper presents a sketch of a new building block for decentralized finance: yTokens. yTokens are like zero-coupon bonds: on-chain obligations that settle on a specific future date based on the price of some target asset, and are secured by collateral in another asset."

2/ 3

"A Decentralized Redeemable BTC-backed ERC-20 Token"

2/ 3
Quantum Attacks on Bitcoin, and How to Protect Against Them

"The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer."

2/ 3
Wavelet: A decentralized, asynchronous, general-purpose proof-of-stakeledger that scales against powerful, adaptive adversaries

"Wavelet introduces a novel family of directed-acyclic-graph (DAG)-based consensus protocols. It is designed to alleviate the numerous scalability dilemmas predicated in decentralized ledgers, such as those that utilize either the longest chain rule, or some variant of stake delegation or committee election scheme."

2/ 3
Manias and Mimesis: Applying René Girard to Financial Bubbles

"René Girard was a literary theorist, philosopher, and sociologist, who wrote about the nature of desire—among many other topics. His model of borrowed desire applies exceptionally well to financial bubbles. This paper explores the theory, with examples from the 19th, 20th, and 21st centuries."

2/ 3
Global Blockchain in Healthcare Market: Focus on Industry Analysis and Opportunity Matrix - Analysis and Forecast, 2018-2025

Whitepaper. "The global blockchain in the healthcare market is expected grow at a CAGR of 63.85% from 2018 to 2025, to reach a value of $5.61 billion by 2025. The use of blockchain for healthcare data exchange will contribute the largest market share throughout the forecast period, reaching a value of $1.89 billion by 2025."

2/ 3
The Rise of Digital Money

"This paper identifies the benefits and risks and highlights regulatory issues that are likely to emerge with a broader adoption of stablecoins. The paper also highlights the risks associated with e-money: potential creation of new monopolies; threats to weaker currencies; concerns about consumer protection and financial stability; and the risk of fostering illegal activities, among others."

2/ 3
Blockchain and Public Companies: A Revolution in Share Ownership Transparency, Proxy-Voting and Corporate Governance?


2/ 3
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."

Subscribe to our newsletter - get a weekly round-up right to your inbox.