2014
Papers (40)
# | Title | |
1. | Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014. | |
2. | A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014. | |
3. | Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014. | |
4. | Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014. | |
5. | Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014. | |
6. | Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014. | |
7. | The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014. | |
8. | Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014. | |
9. | Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014. | |
10. | The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014. | |
11. | Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014. | |
12. | Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014. | |
13. | Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014. | |
14. | Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014. | |
15. | An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014. | |
16. | The Miner's Dilemma Eyal, Ittay. 2014. | |
17. | CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014. | |
18. | Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014. | |
19. | How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014. | |
20. | Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014. | |
21. | Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014. | |
22. | Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014. | |
23. | Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014. | |
24. | A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014. | |
25. | Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014. | |
26. | Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014. | |
27. | Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014. | |
28. | Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014. | |
29. | Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014. | |
30. | Certified Bitcoins Ateniese, Giuseppe and Faonio, Antonio and Magri, Bernardo and de Medeiros, Breno. 2014. | |
31. | On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Courtois, Nicolas T. 2014. | |
32. | Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014. | |
33. | How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014. | |
34. | Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014. | |
35. | Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014. | |
36. | Darkcoin : Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Duffield, Evan and Hagan, Kyle. 2014. | |
37. | Distributed Cryptography Based on the Proofs of Work. Andrychowicz, Marcin and Dziembowski, Stefan. 2014. | |
38. | Secure protocols for accountable warrant execution Kroll, Joshua and Felten, Edward and Boneh, Dan. 2014. | |
39. | Rational zero: Economic security for zerocoin with everlasting anonymity Garman, Christina and Green, Matthew and Miers, Ian and Rubin, Aviel D. 2014. | |
40. | Efficient NIZK arguments via parallel verification of benes networks Lipmaa, Helger. 2014. |
Videos
–
Links
–