Antonopoulos, A. M. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. Sebastopol, CA: O’Reilly Media 133 (2014).

Bartoletti, M., Pompianu, L. “An Analysis of Bitcoin OP_RETURN Metadata.” arXiv preprint (2017). https://arxiv.org/abs/1702.01024.

Bitcoin Core Development Team. “Make Transactions with Extra Data in their ScriptSig’s Non-Standard.” commit message (2012) https://github.com/bitcoin/bitcoin/commit/39f0d9686095bce469dbfa52333331a5d15c6545.

bitcoinj Java Library (accessed July 2017) https://bitcoinj.github.io/.

Blockchain.info (accessed July 2017) https://blockchain.info/.

Coin Sciences Ltd. Coin secrets (beta) (accessed July 2017)

http://coinsecrets.org/.

Erstu, E. (a.k.a. 1Hyena). Cryptograffiti.info v0.90 (accessed July 2017) http://www.cryptograffiti.info/.

HugPuddle Team. Bitfossil (accessed July 2017)

http://bitfossil.com/.

HugPuddle Team, embii, The AtomSea. Apertus (accessed July 2017)

http://apertus.io.

Lopp, J. “Unspent transaction output set graph,” Statoshi dashboard (Accessed July 2017) http://statoshi.info/dashboard/db/unspent-transaction-output-set.

Majakivi, A. (a.k.a. Anduck). Bitcoinstrings.com (accessed July 2017) https://bitcoinstrings.com/.

Miller, A., Juels, A., Shi, E., Parno, B., Katz, J. “Permacoin: Repurposing bitcoin work for data preservation.” In Security and Privacy (SP), 2014 IEEE Symposium on, 475–490 (IEEE, 2014).

Nakamoto, S. “Bitcoin: A peer-to-peer electronic cash system.” (2008) Bitcoin.org (accessed July 2017) https://bitcoin.org/bitcoin.pdf.

Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton: Princeton University Press 217-218 (2016).

Reid, F., Harrigan, M. “An analysis of anonymity in the bitcoin system.” In Y. Altschuler et al. (Eds.) Security and Privacy in Social Networks. New York: Springer 197–223 (2013) http://www.item.ntnu.no/_media/studies/courses/ttm4546/bitcoin_article.pdf.

Ron, D., Shamir, A. “Quantitative Analysis of the Full Bitcoin Transaction Graph.” In A. Sadeghi (Ed.), Financial Cryptography and Data Security, 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers, New York: Springer 6-24 (2013) https://www.springer.com/us/book/9783642398834.

Segregated Witness (segwit) Bitcoin Improvement Proposal. https://github.com/bitcoin/bips/ blob/master/bip-0141.mediawiki.

Shirriff, K. “Bitcoin transaction malleability: looking at the bytes.” Ken Shirriff’s blog (accessed July 2017) http://www.righto.com/2014/02/bitcoin-transaction-malleability.html.

Shirriff, K. “Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela, Wikileaks, photos, and Python software.” Ken Shirriff’s blog (accessed July 2017) http://www.righto.com/2014/02/ascii-bernanke-wikileaks-photographs.html.

Sleiman, M. D., Lauf, A. P., Yampolskiy, R. “Bitcoin message: Data insertion on a proof-of-work cryptocurrency system.” In 2015 International Conference on Cyberworlds, IEEE 332–336 (2015) https://doi.org/10.1109/CW.2015.56.

Todd, P. “Making UTXO set growth irrelevant with low-latency delayed txo commitments” https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2016-May/012715.html.

Todd, P. publish-text.py (accessed July 2017) https://github.com/petertodd/python-bitcoinlib/blob/master/examples/publish-text.py.