EL LIBRO DE SATOSHI
5. S. Haber, W.S. Stornetta, “Secure names for bit-strings,” In Proceedings
of the 4th ACM Conference on Computer and Communications Security,
pages 28-35, April 1997.
6. A. Back, “Hashcash – a denial of service counter-measure,”
http://www.hashcash.org/papers/hashcash.pdf, 2002.
7. R.C. Merkle, “Protocols for public key cryptosystems,” In Proc. 1980
Symposium on Security and Privacy, IEEE Computer Society, pages
122-133, April 1980.
8. W. Feller, “An introduction to probability theory and its applications,”
1957.
336