Proof-of-Useful-Work Decouples Consensus Security from Wasted Energy
A novel Doubly Parallel Local Search mechanism transforms PoW's wasted energy into a decentralized, provably secure combinatorial optimization engine.
Formal MEV Theory Enables Provable Security against Transaction Reordering Attacks
A formal, abstract MEV theory rigorously defines adversarial gain via knowledge axiomatization, enabling proofs of smart contract security.
