Mining Hash Function Computerphile's Hashing Algorithms and Security Papers Majority is not Enough: Bitcoin Mining is Vulnerable Optimal Selfish Mining Strategies in Bitcoin FAQ's What can an attacker with 51% of hash power do? Why is 6 the number of confirms that is considered secure? Why was the target block time chosen to be 10 minutes?