Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Threats to distributed ledger systems           
        6.1     Threats to protocols  
        6.2     Threats to networks  
        6.3     Threats to data            
 7     How stakeholders can use this Recommendation    
Annex A – Security features of DLT    
Appendix I – DLT threat assessment    
Appendix II – Impact of quantum computing on common cryptographic algorithms    
Appendix III – Risk | DLT system | Protection security expression model    
      III.1     Abbreviations and acronyms  
      III.2     Risk | DLT system | Protection security expression model         
Bibliography