Table of Contents

1���� Scope����������
�2���� References
�3���� Definitions
������� 3.1���� Terms defined elsewhere�������
������� 3.2���� Terms defined in this Recommendation�����������
�4���� Abbreviations and acronyms�������������
�5���� Conventions������������
�6���� Threats to distributed ledger systems�����������
������� 6.1���� Threats to protocols��
������� 6.2���� Threats to networks��
������� 6.3���� Threats to data������������
�7���� How stakeholders can use this Recommendation����
Annex A � Security features of DLT����
Appendix I � DLT threat assessment����
Appendix II � Impact of quantum computing on common cryptographic algorithms����
Appendix III � Risk | DLT system | Protection security expression model����
����� III.1���� Abbreviations and acronyms��
����� III.2���� Risk | DLT system | Protection security expression model���������
Bibliography����