Ah, I found Verifiable delay functions and attacks. Also for reference for others there is RANDAO beacon exploitability analysis, round 2.
Ah, I found Verifiable delay functions and attacks. Also for reference for others there is RANDAO beacon exploitability analysis, round 2.