<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Extrapolation to Calculate the Probability of a Double Spending Attack</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. KarazinKharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine nlfsr</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>lazareva</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>elizaveta@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Simon Kuznets Kharkiv National University of Economics</institution>
          ,
          <addr-line>Nauky avenue 9а, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>One of the important aspects of the efficiency of modern distributed networks built using blockchain technologies is the study of the security of consensus protocols. In particular, the most common cryptocurrencies and blockchain systems with probabilistic consensus protocols are subjects to so-called double-spending attack. The basis of such an attack is the use of the attacker's computing capabilities to form alternative blockchains. If the generated sequence is longer than the public chain of blocks, the attacker can present it as the proof of work and thus disrupt the correct functioning of the network. In this article we explore the probability of a successful double-spending attack, derive formulas for evaluating the corresponding events, consisting of the formation by the attacker of an alternative sequence of blocks. These formulas are extremely cumbersome and difficult to calculate. The paper proposes simplified analytical expressions to quickly assess the probability of a successful doublespending attack. For this we use the extrapolation of intermediate calculations using the Lagrange interpolation formulas, as well as binomial approximation. The simulation results show that the use of simplified expressions allows us to provide acceptable accuracy of calculations.</p>
      </abstract>
      <kwd-group>
        <kwd>blockchain technology</kwd>
        <kwd>consensus protocols</kwd>
        <kwd>proof-ofwork</kwd>
        <kwd>double-spending attack</kwd>
        <kwd>polynomial interpolation</kwd>
        <kwd>binomial approximation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Modern decentralized systems are a real alternative to the classical centralized
approach in creating of complex information and telecommunication systems and
networks [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. For example, it is advisable to use decentralization in complex systems
of corporate relations, in the provision of state and administrative functions, to build
independent cryptocurrencies, as well as to create secure registers, cadastres, etc.
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. These and many other aspects show the clear advantage of decentralized systems
built on blockchain technology [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>At the same time, for the most developed and studied blockchain networks with
probabilistic consensus protocols, there is a risk of a double-spending attack. The
essence of the attack is to use the features of consensus building protocols. For example,
in the proof-of-work protocols, each record in the protected registry (each block of
records) can be made only by the participant who was the first to solve the exhaustive
task of finding the preimage of the cryptographic hash function. The block chain
stores all the important records, and each following record (block of records) is
connected with the previous ones through a one-way hash function. This is a reliable and
safe way to save critical data, protect it from falsification, alteration, intentional or
accidental modification. At the same time, an attacker who has sufficient computing
resources may try to form an alternative chain of blocks (with other records in
previous blocks). This will give him the opportunity to disrupt the proper functioning of
the blockchain network, for example, by spending the same assets twice
(cryptocurrencies, tokens, etc.). The probability of such unauthorized interference is extremely
small (with the small computing capabilities of an individual attacker it is almost
impossible). However, when building a critical information infrastructure, an extremely
important aspect is the assessment of various risks and threats to information security,
including the probabilities of successful implementation of various attacks. Therefore,
assessing the security of blockchain systems and, in particular, assessing the
likelihood of a successful implementation of a double-spending attack in systems with
probabilistic consensus protocols, is an urgent and practically important scientific
task.</p>
      <p>
        In this article, we consider consensus protocols with probabilistic completion (such
as proof-of-work), and assess the probability of a successful double-spending attack.
For this, we use the model of independent players (as in our previous works [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). This
model differs from the gambler's ruin model adopted in [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] by both the number of
elementary outcomes and general expressions for assessing the probability of a
successful attack. To simplify computational calculations, we use polynomial
interpolation, as well as binomial coefficients to extrapolate intermediate calculations. The
results of numerical simulation show that simplified formulas can significantly reduce
computational costs and obtain approximate estimates with acceptable accuracy of
calculations. These results can be used to calculate the security indicators of
blockchain networks with probabilistic consensus protocols.
2
      </p>
      <p>The probabilities of forming a chain of blocks under the same
initial conditions
To obtain the formula for the probability of a successful double-spending attack, let
us consider the following possible probabilities and combinations in which the
attacker succeeds:
1. Success is not possible on the first attempt ( t  N  j  k  1  0  0  1 ). The
attacker may form no more than one block in one attempt, and in order to succeed,
he needs to wait for the generation of the block by the honest network and extend
the chain of blocks to one more. Thus, the attacker needs to form at least two
blocks. The probability of success of the attacker is defined as: PIN 1, j0,k 0  0
2. The attacker may succeed on the second attempt ( t  N  0 1  2 ) if he managed
to form on both attempts per block, and the honest network will form only one
block (no matter on the first or second attempt).The total probability of this event:
PIN 1, j0,k1  p  1 p q  q  1 p  p q  q  2  p  1 p  q2
3. On the third attempt ( t  N  0  2  3 ). If the honest network forms a block on the
first or second attempt, then the second block should be formed by the attacker
only on the third attempt, otherwise (if the second block is formed on the second
attempt) there is a previous case (as for PIN 1, j0,k 1 ). If the honest network forms
the second block on the third attempt, there are no restrictions on the formation of
blocks for the attacker. The total probability of the event will be calculated
similarly to the events described above. Thus, the total probability will be:
PIN 1, j0,k 2  2  p1  1  p2 2  q2  1 q1  </p>
      <p>
 p1  1  p 2 3 q2  1  q1  q3  .</p>
      <p>
4. On the fourth attempt ( t  N  0  3  4 ) similar to the situation described in the
previous paragraph, the total probability for the attacker to succeed will be equal
to:</p>
      <p>PIN 1, j0,k 3  3  p1  1  p3 3 q2  1  q 2  </p>
      <p> 
 p1  1  p 3 6  q2  1 q2  4  q3  1  q 1  q4  .
5. On the t -th attempt ( t  N  0  k ) the probability of success of the attacker is
equal to:
PIN 1, j0,k k  p1  1  p k 
 k 2  q2  1 q k 1  1   k  1  q0  1 qk 1   k  1  q1  1 q k 
   0   1  
Carrying out similar constructions and summing all the k  0,1, 2, , we find the
probability of a successful double-spending attack, provided that the honest
network is formed of no more than N  1 blocks:</p>
      <p>  k 
PIN 1, j0    p  1  p  k  q2  1  qk 1 
k 1  
 1   k  1  q0  1 qk 1   k 1  q1  1 qk .</p>
      <p>  0   1  </p>
    </sec>
    <sec id="sec-2">
      <title>Let us consider the case when N  2, j  0 .</title>
      <p>If k  0 , as well as in the previous case, success is impossible.</p>
      <p>If k  1 and, therefore, t  N  0 1  3 , the probability of success of the attacker
is equal to:</p>
      <p>PIN 2, j0,k1  3 p2  1 p  q3.</p>
      <p>If k  2 ( t  4 ), the probability of successful attack is equal to:</p>
      <p>PIN 2, j0,k 2  3  p2  1  p 2  3 q3  1 q 
3  p2  1  p2  4  q3  1  q   q4  .</p>
      <p>If k  3 ( t  5 ), the probability of success of the attacker is equal to:
PIN 2, j0,k 3  6  p2  1  p3  6  q3  1  q 2  

 4  p2  1  p 3  10  q3  1  q 2  5  q4  1 q1  1 q5  .</p>
      <p>The above results allow us to obtain expressions for arbitrary values of N and k :
 k  t 12
PIN N, j0   p N  1  p   N   qN 1  1  q k 1 
k 1 
 N 1  1      qi  1  q ti 
 t 1   N  t 
  .</p>
      <p>i0  i  </p>
    </sec>
    <sec id="sec-3">
      <title>Let us consider the case for N  1, j  1 . If k  0 attacker's success is impossible If k  1 the probability of success of the attacker is equal to:</title>
      <p>PIN 1, j1,k1  p  p  1 p q  q  q .</p>
      <p>If k  2 ( t  4 ) the probability of the attacker's success is equal to:
PIN 1, j1,k 2  p2  1  p2  q3  1 q 3  2  2 .</p>
      <p>
If k  3 ( t  5 ) the probability for the attacer to succeed is equal to:</p>
      <p>PIN 1, j1,k 3  pN  j  1  pk  qN  j1  1  q k 1 
 k   t 1  k 1  t  2   k  2   t  3
              .</p>
      <p> 1   2    1   2   1   2 </p>
      <p>Thus, summarizing the results for arbitrary initial values, we obtain the probability
of a successful double-spending attack ( PI ) on blockchain systems using the
consensus algorithm Proof of Work based on a hash function (without the attacker's
advantage in one pre-formed block):</p>
      <p>where
sumq </p>
      <p> k  t 12
PI  p N   1  p      qN 1  1 qk 1 </p>
      <p>k 1  N 
 N 1  1     qi  1 q ti 
 t 1   N  t 
   </p>
      <p>i0  i  
   pN  j  qN  j1   sump  1  pk  1  q k 1 ,</p>
      <p>
j1  k 1  </p>
      <p>t  N  j  k ;
sump 
k  k 1 
   
ip(N j) 1 ip(N j1) ip(N j) 1
t2  t1   
    sumq     ;
ip2 ip3 1 ip1 ip2 1
(1)

k  k 1 
   
iq(N j) 1 iq(N j1) iq(N j) 1
t j1  t j 
   
iq( j1) iq( j2) 1 iq j maxiq( j1) 1,ip( j)  
t2  t1
  
iq2 maxiq3 1,ip2   iq1maxiq2 1,ip1</p>
      <p>    
1     .</p>
      <p>    </p>
      <p>Although the expression (1) provides an accurate quantitative result on the
probability of successful double-spending attacks, it also has limitations on its use, which
is related to the polynomial complexity of computational calculations. In this paper,
we propose using an approximate formula to calculate the probability of a successful
attack. For this, simplified expressions based on polynomial interpolation can be used.
In addition, we explore other approximation methods, including using binomial
coefficients.</p>
      <p>Extrapolation of the sum in the formula of calculation of the
probability of success of the attacker
The value of sums ( sump and sumq ) is increasing very fast and even at j  10 and
k  15 the calculation becomes a very difficult task. For example, if j  20 and
k  7 the sum sump  16 570 275 123 (this value was calculated by the computer for
several hours). On the other hand, these sums for each value N could be calculated
once and used for different probabilities. Tables 1, 2, as an example, provide
calculated values of sump for N  1,5 and some values of j and k .</p>
      <p>
        However, given the limited number of calculated coefficients of sump , the
expression (1) gives a good match with the experimental data (setting up the computational
experiment is given in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) when the probabilities q and p significantly (twice or
more) differ from each other. However, there is no need to calculate the large number
of values in the sum by j , that allows to be limited to some small pre-calculated set
of values of sump . Also, at q, p  0, 2 the blocks will be formed with a relatively
high probability, that makes it possible to significantly reduce the sum by k . In
addition, for smaller values N , the sum sump grows more slowly, making it possible to
calculate sump for more values j and k .
      </p>
      <p>However, in order to improve the accuracy of the calculation (increasing the
calculated coefficients j and k ), it is possible to extrapolate the values of sump using
polynomial approximation. Thus, for j  1 the value sump is very well approximated
(within known values of k ) and extrapolated (beyond calculated values of k ) by a
polynomial:</p>
      <p>sump (N  1, j  1, k)  0,125 k 4  0, 4167  k3  0,375 k 2  0, 0833 k ,
for j  2 :
sump (N  1, j  2, k)  0, 0097  k 6  0, 0792  k 5  0, 2431 k 4  0, 3542  k 3 </p>
      <p>Extrapolation is also well done by j , and the value of k is fixed.
sume xi to be ki or ji ), where i  1, 2,, n , and n is the number of points by which
the Lagrangian polynomial is constructed (in our case, for N  1 , n must be chosen
as n  3  2  j for extrapolations by k and as n  2  k 1 for extrapolations by j ),
then we can extrapolate sump by Lagrange interpolation polynomial:
sump  n  sump (xi )  n x  xs  .</p>
      <p>
i0  ssi0, xi  xs </p>
      <p>The results of the extrapolation of value of sump are illustrated in Figure 1, which
shows a graph of the dependence of precisely calculated values of sump (solid line)
by formula (1) and its approximation and extrapolation (dashed line).</p>
      <p>Extrapolation using a polynomial gives a very good accuracy, but with increasing
k ( j ) increases the number of first values of sump that must be known and whose
values are taken into account in the Lagrangian interpolation polynomial. Given that
we are aware of a rather limited number of sump (for example, in Table 2 for k  7
this is only for j  15 ) polynomial extrapolation will also have some limits.</p>
      <p>The next extrapolation method we have applied is binomial extrapolation, that is,
extrapolation using binomial coefficients of the form</p>
      <p> N  j  ki 12
sump  d   N  j 
where d – some coefficient 0  d  1, which is selected experimentally.</p>
      <p>Binomial extrapolation gives much less precision than polynomial, but better than
neglecting additives in general. This is especially noticeable when q  p and a
significant number of coefficients j and k must be considered.</p>
      <p>Thus, the results obtained can significantly reduce the complexity of the
calculations when calculating the probability of a successful double-spending attack. In
particular, to calculate the probabilities by the formula (1), it is necessary to calculate an
infinite number of sums sump , each of which in turn is formed by summing a large
number of terms. We were able to simplify these intermediate sums by introducing
interpolation polynomial equations. By extrapolating the sums to a larger data range,
we can replace complex and cumbersome calculations with simple and convenient
calculations based on interpolation polynomials. The simulation results show that the
values calculated in this way almost 100% repeat the results obtained by exact
expressions using formula (1).
Fig. 1. Dependencies of values of sump (solid line) calculated by formula (1) and its
approximation and extrapolation (dashed line) for N  1 a) extrapolation by k b) extrapolation by j</p>
      <p>
        These results can be useful for assessing the security of blockchain networks with
probabilistic consensus building [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9-11</xref>
        ]. In particular, practical recommendations for
constructing asset transfer protocols in decentralized systems can be justified through
restrictions on the probability of corresponding risks. For example, given the
restrictions on the admissible probability of loss of an asset as a result of a double-spending
attack, our formulas allow us to calculate the minimum number of confirmed
transactions (length of a chain of blocks) and these calculations can be performed very
quickly even in the conditions of a rapid change in the share of controlled computing
resources. These and other studies are our promising areas of further work.
4
      </p>
      <p>Conclusions
This paper address in detail one of the main vulnerabilities of blockchain systems
built by consensus with probabilistic completeness - the double-spending attack.</p>
      <p>Basing on the model of "independent players", we have obtained the analytical
expression of the probability of a successful double-spending attack on a blockchain
system which uses the consensus algorithm Proof of Work (PoW) based on a hash
function depending on the number of confirmations used and the number of attempts
and hash rate of both the honest network and the attacker.</p>
      <p>The adopted model of "independent players" and the resulting formula (1)
eliminates the significant disadvantages inherent in other work in this field, namely:
 the race between two participants of the network does not have to be endless, it is
enough to be limited by some fixed number of attempts;
 uses a more adequate, in the authors' view, model of "independent players", which
includes a space of four elementary events, instead of two, used in the model of
"gambler's ruin";
 the probability of forming a block with the honest network and the attacker are
independent quantities that are directly determined by the capacities possessed by
the participants, and the mentionedprobabilities are independent on each other, that
is, the requirement p  q  1 is optional;
 it is calculated the probability for the attacker to be ahead of the honest network,
and not only the probability of catching up with it, that is, when the attacker does
not have an advantagein one pre-formed block.</p>
      <p>The quantitative values obtained by the expression (1) of the probability of a
successful attack for different opportunities of the attacker (the probability of forming a
block), the different number of formed blocks after which the agreement is considered
confirmed, the different duration of the race (the number of blocks during which the
attacker continues to catch up the network) are given. To simplify the numerical
calculations, it is proposed to use polynomial approximation. In particular, the
intermediate sums in formula (1) were able to be approximated by Lagrange interpolation
polynomials. In addition, we used binomial extrapolation. However, the simulation
results show that polynomial interpolation provides greater accuracy. The formulas
obtained make it possible to quickly assess the probability of a successful
doublespending attack using these simplified formulas.</p>
      <p>
        This study can be useful for modeling and evaluating the effectiveness of
blockchain networks, as well as in other practically important applications [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16">12-16</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Zaghloul</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mutka</surname>
            ,
            <given-names>M.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ren</surname>
          </string-name>
          , J.:
          <article-title>Bitcoin and Blockchain: Security and Privacy</article-title>
          . ArXiv, abs/
          <year>1904</year>
          .11435 (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System (</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rosenfeld</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Analysis of hashrate-based double-spending (</article-title>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Poluyanenko</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Simulation of double spend attack on the “Proof of Work” consensus protocol</article-title>
          .
          <source>Radiotekhnika</source>
          .
          <volume>3</volume>
          ,
          <fpage>146</fpage>
          -
          <lpage>161</lpage>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .30837/rt.
          <year>2019</year>
          .
          <volume>3</volume>
          .198.11 (in Russian)
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zaghloul</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mutka</surname>
            ,
            <given-names>M.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ren</surname>
          </string-name>
          , J.:
          <source>Bitcoin and Blockchain: Security and Privacy</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ozisik</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levine</surname>
            ,
            <given-names>B.N.:</given-names>
          </string-name>
          <article-title>An Explanation of Nakamoto's Analysis of Double-</article-title>
          spend
          <string-name>
            <surname>Attacks</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Turchak</surname>
            ,
            <given-names>L.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plotnikov</surname>
            ,
            <given-names>P.V.</given-names>
          </string-name>
          :
          <article-title>Fundamentals of numerical methods</article-title>
          . Moscow, Fizmat-lit. 304 p. (
          <year>2003</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Interpolating</given-names>
            <surname>Polynomial</surname>
          </string-name>
          , http://dx.doi.org/10.3840/001276, (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Pilkington</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Blockchain technology: principles and applications</article-title>
          , http://dx.doi.org/10.4337/9781784717766.00019, (
          <issue>0</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Salman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Probabilistic Blockchains: A Blockchain Paradigm for Collaborative Decision-Making</article-title>
          .
          <source>In: 2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)</source>
          .
          <source>IEEE</source>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/UEMCON.
          <year>2018</year>
          .8796512
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Bhat</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vijayal</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A Probabilistic Analysis on Crypto-Currencies Based on Blockchain</article-title>
          .
          <source>In: 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)</source>
          .
          <source>IEEE</source>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/ICNGCIS.
          <year>2017</year>
          .37
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shekhanin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolhatin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perevozova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Performance of Hash Algorithms on GPUs for Use in Blockchain</article-title>
          .
          <source>In: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)</source>
          .
          <source>IEEE</source>
          (
          <year>2019</year>
          ).
          <source>doi: 10.1109/ATIT49449</source>
          .
          <year>2019</year>
          .9030442
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Bondarenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liliya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oksana</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Inna</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Modelling instruments in risk management</article-title>
          .
          <source>International Journal of Civil Engineering and Technology</source>
          .
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1561</fpage>
          -
          <lpage>1568</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Runovski</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmeisser</surname>
          </string-name>
          , H.:
          <article-title>On the convergence of fourier means and interpolation means</article-title>
          .
          <source>Journal of Computational Analysis and Applications</source>
          .
          <volume>6</volume>
          (
          <issue>3</issue>
          ),
          <fpage>211</fpage>
          -
          <lpage>227</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Tkach</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urmancheva</surname>
            ,
            <given-names>L.B.</given-names>
          </string-name>
          :
          <article-title>Numerical-analytic method for finding solutions of systems with distributed parameters and integral condition</article-title>
          .
          <source>Nonlinear Oscillations</source>
          .
          <volume>12</volume>
          ,
          <fpage>113</fpage>
          -
          <lpage>122</lpage>
          (
          <year>2009</year>
          ).
          <source>doi:10.1007/s11072-009-0064-6</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Chornei</surname>
            ,
            <given-names>R.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daduna</surname>
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Knopov</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.S.</surname>
          </string-name>
          :
          <article-title>Controlled Markov Fields with Finite State Space on Graphs</article-title>
          .
          <source>Stochastic Models</source>
          .
          <volume>21</volume>
          ,
          <fpage>847</fpage>
          -
          <lpage>874</lpage>
          (
          <year>2005</year>
          ).
          <source>doi:10.1080/15326340500294520</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>