Bitcoin: A Peer-to-Peer Electronic Cash System. Satoshi Nakamoto. 2009
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
 W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998.
 H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal
trust requirements," In 20th Symposium on Information Theory in the Benelux , May 1999.
 S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology , vol 3, no
2, pages 99-111, 1991.
 D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping,"
In Sequences II: Methods in Communication, Security and Computer Science , pages 329-334, 1993.
 S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference
on Computer and Communications Security , pages 28-35, April 1997.
 A. Back, "Hashcash - a denial of service counter-measure,"
 R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and
Privacy , IEEE Computer Society, pages 122-133, April 1980.
 W. Feller, "An introduction to probability theory and its applications," 1957.
The Blockchain Library’s goals are twofold: to provide easy access to resources on cryptocurrency research for scholars, academics, analysts, and anyone with an interest in cryptocurrency publications; the second is provide an archive and historical timeline on the development of the blockchain field and to document the journey of its growth.