Bitcoin community (2015). Bitcoin wiki: Non-specialized
hardware comparison. https://en.bitcoin.it/wiki/Non-
specialized hardware comparison. Accessed 2016-
11-14.
Bitcoin community (2016). Bitcoin wiki: Mining
hardware comparison. https://en.bitcoin.it
/wiki/Mining hardware comparison. Accessed
2016-11-14.
Bortolotti, D., Pinto, C., and Marongiu, A. (2013). Virtual-
SoC: A full system simulation environment for mas-
sively parallel heterogeneous System-on-Chip. In Pa-
rallel and Distributed Processing Symposium Works-
hop & PhD Forum.
Dwork, C. and Naor, M. (1993). Pricing via Processing, Or,
Combatting Junk Mail, Advances in Cryptology. In
CRYPTO’92: Lecture Notes in Computer Science No.
740, page 139–147. Springer.
Etherium Project (2016). Ethash specification.
https://github.com/ethereum/wiki/wiki/Ethash.
Accessed 2016-11-14.
Franco, Pedro (2014). Understanding Bitcoin: Crypto-
graphy, Engineering and Economics. John Wiley &
Sons.
Gervais, A., Karame, G. O., W
¨
ust, K., Glykantzis, V., Ritz-
dorf, H., and Capkun, S. (2016). On the security and
performance of proof of work blockchains. In Procee-
dings of the ACM SIGSAC Conference on Computer
and Communications Security (CCS’16).
Guo, X., Srivastav, M., Huang, S., Ganta, D., Henry, M. B.,
Nazhandali, L., and Schaumont, P. (2012). ASIC im-
plementations of five SHA-3 finalists. In 2012 De-
sign, Automation Test in Europe Conference Exhibi-
tion (DATE), pages 1006–1011.
Heirman, W., Sarkar, S., and Carlson, T. (2012). Power-
aware multi-core simulation for early design stage
hardware/software co-optimization. In Proceedings of
the 21st international conference on parallel architec-
tures and compilation techniques.
Jungk, B. (2012). Evaluation of compact FPGA implemen-
tations for all SHA-3 finalists. In The Third SHA-3
Candidate Conference.
Kaps, J.-P., Yalla, P., Surapathi, K. K., Habib, B., Vadla-
mudi, S., and Gurung, S. (2012). Lightweight imple-
mentations of SHA-3 finalists on FPGAs. In The Third
SHA-3 Candidate Conference. Citeseer.
Kreku, J. (2012). Early-phase Performance Evaluation of
Computer Systems using Workload Models and Sys-
temC.
Kreku, J., Tiensyrj
¨
a, K., and Vanmeerbeeck, G. (2010). Au-
tomatic Workload Generation for System-level Explo-
ration based on Modified GCC Compiler. In Procee-
dings of the Design, Automation and Test in Europe
Conference and Exhibition.
Latif, K., Rao, M. M., Aziz, A., and Mahboob, A. (2012).
Efficient hardware implementations and hardware per-
formance evaluation of SHA-3 finalists. In The Third
SHA-3 Candidate Conference.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. https://bitcointalk.org/bitcoin.pdf.
NIST (2015). SHA-3 Standard: Permutation-Based
Hash and Extendable-Output Functions. FIPS
PUB 202. http://nvlpubs.nist.gov/nistpubs
/FIPS/NIST.FIPS.202.pdf.
O’Dwyer, K. and Malone, D. (2014). Bitcoin mining and
its energy footprint. In IET Irish Signals & Systems
Conference.
Papaefstathiou, I., Chrysos, G., and Sarakis, L. (2015).
COSSIM: A Novel, Comprehensible, Ultra-Fast,
Security-Aware CPS Simulator.
Pessl, P. and Hutter, M. (2013). Pushing the limits of SHA-
3 hardware implementations to fit on RFID. In Inter-
national Workshop on Cryptographic Hardware and
Embedded Systems, pages 126–141. Springer.
Posadas, H., Real, S., and Villar, E. (2011). M3-Scope:
Performance modelling of multi-processor embedded
systems for fast design space exploration.
Rittinghaus, M., Miller, K., Hillenbrand, M., and Bellosa,
F. (2013). SimuBoost: Scalable Parallelization of
Functional System Simulation. In 11th International
Workshop on Dynamic Analysis.
Schwabe, P., Yang, B.-Y., and Yang, S.-Y. (2012). SHA-3
on ARM11 processors. In International Conference
on Cryptology in Africa, pages 324–341. Springer.
Van Stralen, P. and Pimentel, A. (2010). Scenario-based de-
sign space exploration of MPSoCs. In Proceedings of
the IEEE International Conference on Computer De-
sign.
Wood, G. (2014). Ethereum: A secure decentralised ge-
neralised transaction ledger. Ethereum Project Yellow
Paper.
Evaluating the Efficiency of Blockchains in IoT with Simulations
223