Anvil256 Whitepaper
Anvil256 Whitepaper
Anvil256 is a proof-of-work token combining Keccak-Cascade PoW with temporal miner binding, Nakamoto-Coefficient-Throttle difficulty, pure epoch-native halving, protocol-owned liquidity, and a $0.10 native-ETH protocol fee — deployed on Base L2.
If , the miner receives ANVL and the protocol-owned liquidity reserve receives up to ANVL inside the hard cap:
Admin keys: .
v0.3 — 2026 · Base L2 · ERC-20 · immutable bytecode
Abstract
Anvil256 (ticker ANVL) is an ERC-20 token with a 21,000,000 ANVL hard cap, proof-of-work miner rewards, and explicit protocol-owned liquidity reserves. It introduces four constructions absent from any prior production PoW token in combination.
1. Keccak-Cascade PoW with Temporal Miner Binding. A three-layer hash construction. For epoch , miner , and nonce :
where is a strictly monotonic, non-transferable on-chain counter — the miner’s accumulated identity. A nonce is valid iff . The outer layer binds each puzzle to , a value determined only when epoch closes, making precomputation structurally impossible.
2. Nakamoto Coefficient Throttle (NCT). A second difficulty control signal derived from concentration in the 256-epoch miner window. With distinct addresses and filled slots (steady state ):
This signal is always and is added to the PI timing signal in log-difficulty space. Centralisation raises ; the unique Nash equilibrium of minimal difficulty requires (full distribution).
3. Discrete-Time PI Controller on . With Lyapunov function , one-step decrement , and LaSalle invariance implying global asymptotic stability of the origin . Difficulty update:
where and is computed as a 4th-order Maclaurin polynomial with truncation error .
4. Pure Epoch-Native Emission.
All supply parameters are expressed in epochs (confirmed mine() calls):
No calendar dates. No block times. Wall-clock duration is an observable, not a protocol input.
1. Design Goals
No Dev Premine. There is no team mint, VC allocation, presale, or admin mint. The constructor mints a 1 ANVL genesis seed to the contract for the official ANVL/WETH LP, and every valid mine mints a 10% POL token reserve alongside the miner reward. The claim is no dev premine, not “every token goes directly to miners.”
Structural Anti-Precomputation. PPT adversary that computes a valid nonce for epoch before is produced, except with negligible probability. Formal proof in MATH.md §1.5.
Anti-Wallet-Rotation. Cost of maintaining independent miner identities for one window cycle: \sigma(k) = k \times \0.10kk \times $0.10$. These are equal, so Sybil is economically dominated.
Decentralisation as Nash Equilibrium. The unique minimiser of the difficulty signal is (full distribution). This is not a policy — it is a provable property of the controller equations.
Epoch Purity. The next halving occurs at epoch . No block time. No calendar.
Immutability. admin key, upgrade proxy. The deployed bytecode is the permanent, unalterable protocol.
2. Keccak-Cascade PoW
2.1 Wallet-Rotation Attack — Formal Analysis
Definition 2.1 (Naive PoW). Challenge: . A nonce is valid iff .
Problem. For any , is independent of . Generating costs elliptic-curve operations. Therefore:
The NCT concentration signal is then trivially spoofable: a single physical operator can appear as independent miners by using fresh addresses, paying zero additional protocol cost.
2.2 Temporal Miner Binding — Construction
Definition 2.2 (-Counter). For address :
Implemented as uint64 minerEpochCount[m], pre-increment value at each call.
Properties: strictly non-decreasing, non-transferable, permanent.
Definition 2.3 (Full Cascade). For epoch , caller , nonce :
Valid iff .
2.3 Security Properties — Summary Table
| Property | Standard PoW | Cascade PoW |
|---|---|---|
| Precomputation | (same as online) | Same (structural impossibility via ) |
| Wallet rotation cost | \sigma(k) \geq k \times \0.10$ | |
| Rainbow table (known miners) | Feasible for fixed | Infeasible: rotates every epoch; personalises |
| Cross-miner nonce theft | not included — feasible | includes ; |
| Replay across epochs | Blocked by epoch counter | Blocked by change (independent per epoch) |
| ASIC optimisation | Full precompute feasible | Outer pass requires live : mandatory per-epoch network fetch |
2.4 Gas Cost
Total mine() gas: . At Base L2 basefee gwei:
Full per-opcode breakdown in MATH.md §1.6.
3. Nakamoto Coefficient Throttle
3.1 Motivation — Insufficiency of Timing-Only Controllers
In all prior production PoW systems, the difficulty controller is driven purely by timing: . This signal is invariant to who mines — one actor with 99% of hashrate produces the same timing signal as 1,000 evenly-distributed actors at identical aggregate rate.
Definition 3.1 (Concentration Factor). Let be the number of distinct addresses in the 256-slot miner window. The concentration factor is:
maximal distribution (). complete centralisation ().
3.2 NCT Signal — Derivation and Equilibrium Analysis
This is always : the NCT only ever pushes difficulty upward.
It cannot lower difficulty below what the timing PI alone would set.
(Internally, MinerWindow.nctSignal() returns the negated value; PIController
subtracts it, yielding the same result as adding the positive magnitude above.
See MATH.md §2.3 for the full sign derivation.)
Equilibrium table:
| Difficulty multiplier per period | |||
|---|---|---|---|
| 256 | 1.0 | (PI governs) | |
| 128 | 2.0 | ||
| 32 | 8.0 | ||
| 16 | 16.0 | (capped) | |
| 1 | 256.0 | (capped) | compounding per period |
Nash Equilibrium. The unique strategy profile that minimises difficulty (and thus maximises expected reward per unit of hashrate) is . Any deviation toward concentration increases , raising for all miners. This is not enforced externally — it is the mathematical structure of the update equation.
3.3 Combined Update
Define the NCT penalty magnitude
(see MATH.md §2.3 for the sign convention and its derivation from the
MinerWindow.nctSignal() return value).
NCT always raises or holds difficulty. Because , adding it to can only increase (before the outer clamp), which increases . Centralisation is penalised; decentralisation (, ) removes the penalty entirely.
Additivity in -space corresponds to multiplicativity in -space, which is the correct composition law for independent signals on a multiplicative quantity. Formal proof in MATH.md §3.4.
4. Timing PI Controller
4.1 Equations
With target :
4.2 Stability Certificate (Summary)
Lyapunov function: . One-step decrement: . LaSalle invariance: largest invariant set in is . Conclusion: globally asymptotically stable origin in unsaturated regime. Full proof in MATH.md §3.3.
5. Epoch-Native Emission
5.1 Reward Function
5.2 Miner-Only Schedule — Idealized Derivation
The closed-form miner-only schedule is the Bitcoin-style baseline:
The deployed contract adds two hard-cap-inclusive components: a 1 ANVL genesis LP seed and a 10% POL token reserve minted beside each miner reward:
Therefore the practical minting process reaches the 21,000,000 ANVL cap earlier
than the pure miner-only terminus. The reserve is not inflation outside the cap;
it is constrained by the same MAX_SUPPLY check.
5.3 Halving Schedule
| Halving | Epoch | (miner ANVL) | Miner-only cumulative | % of 21 M |
|---|---|---|---|---|
| 0 | 0 | 50 | 10,500,000 | 50.000% |
| 1 | 210,000 | 25 | 15,750,000 | 75.000% |
| 2 | 420,000 | 12.5 | 18,375,000 | 87.500% |
| 3 | 630,000 | 6.25 | 19,687,500 | 93.750% |
| 4 | 840,000 | 3.125 | 20,343,750 | 96.875% |
| 5 | 1,050,000 | 1.5625 | 20,671,875 | 98.438% |
| 7 | 1,470,000 | 0.390625 | 20,917,969 | 99.609% |
| 10 | 2,100,000 | 0.048828 | 20,989,746 | 99.951% |
| 32+ | 6,720,000+ | |||
| 64 | 13,440,000 | 0 | 21,000,000 | 100.000% |
The table is a miner-only schedule reference. Actual totalSupply also includes
the genesis LP seed and POL reserve mints, and is truncated by the hard cap.
6. Protocol Fee
At ETH = \2{,}500\text{fee}_{\text{wei}} = 4\times 10^{13}= $0.10$. Full dimensional derivation in MATH.md §5.
The fee is split deterministically:
The dev split is transferred to the immutable feeRecipient. The LP split is
accumulated as lpReserveEthWei and paired with the LP token reserve:
Before the 50% supply trigger, reserves accumulate. At and after the trigger:
any caller may run deployLiquidityReserves(). Later reserves can be added via
dripLiquidityReserves(). Official Uniswap v3 LP NFTs are held by the token
contract and no withdrawal path exists.
7. Security Summary
| Threat | Formal Mitigation |
|---|---|
| Keccak preimage | (birthday bound, NIST FIPS 202) |
| Cascade precomputation | uniformly random before epoch closes (Theorem 1.11, MATH.md) |
| Wallet rotation / Sybil | \sigma(k) \geq k \times \0.10$ (Theorem 1.9, MATH.md) |
| Rainbow table over miners | rotates per epoch; personalises per address |
| NCT Sybil (fake diversity) | Costs \0.10/\text{mine}$ — equal to legitimate mining (Corollary 1.10) |
| Nonce replay across epochs | is independent per epoch; reuse invalid |
| Cross-miner nonce theft | includes ; different caller different challenge |
| Oracle manipulation | Reverts O1–O4; client-side MAX_FEE_USD cap (MATH.md §5.2) |
| Difficulty collapse | floor; envelope |
| Integrator windup | anti-windup saturation |
| Selfish mining | N/A: Base L2 deterministic sequencer finality |
8. Comparison with Prior PoW Tokens
| Bitcoin | 0xBitcoin | Catecoin | Anvil256 | |
|---|---|---|---|---|
| Hash function | SHA-256 | Keccak-256 | Various | Cascade Keccak |
| Precomputation | Yes | Yes | Yes | No (Theorem 1.11) |
| Rotation cost | 0 | 0 | 0 | \geq k\times\0.10$ |
| Difficulty algorithm | Ratio | Ratio | LWMA | PI + NCT (Lyapunov) |
| Decentralisation signal | None | None | None | On-chain NCT |
| Halving unit | Blocks | Blocks | Blocks | Pure epochs |
| Fee mechanism | None | Gas only | Gas only | $0.10 native ETH split 50/50 (Chainlink) |
9. Glossary
| Term | Formal Definition |
|---|---|
| Epoch | One successful mine() — atomic unit of all protocol timekeeping |
| Period | epochs — difficulty controller update interval |
| Halving | Every epochs; |
| — strictly monotonic, non-transferable | |
| — temporal identity hash | |
| Cascade | Three-layer Keccak: -layer, -layer, -layer |
| NCT | Nakamoto Coefficient Throttle — |
| — concentration factor; distributed, centralised | |
| WAD | — Q60.18 fixed-point scale |
10. References
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008.
- Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. 2014.
- Åström, K.J. & Murray, R.M. Feedback Systems. Princeton University Press, 2nd ed. 2021.
- Khalil, H.K. Nonlinear Systems. Prentice Hall, 3rd ed. 2002.
- LaSalle, J.P. The Stability of Dynamical Systems. SIAM, 1976.
- NIST FIPS 202. SHA-3 Standard. 2015.
- Chainlink Labs. Data Feed Heartbeats and Deviation Thresholds. docs.chain.link.
- MATH.md, TOKENOMICS.md, ARCHITECTURE.md, SECURITY.md.