Papers (40)

#Title
Citations
1.Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014.   
7444
2.A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014.   
4382
3.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014.   
2766
4.Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014.
2453
5.Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014.   
2280
6.Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014.   
1772
7.The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014.   
1749
8.Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014.
879
9.Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014.
865
10.The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014.
842
11.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014.
722
12.Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014.
694
13.Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014.
573
14.Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014.
553
15.An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014.
546
16.The Miner's Dilemma Eyal, Ittay. 2014.   
539
17.CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014.
520
18.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014.
512
19.How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014.
448
20.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014.
420
21.Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014.
394
22.Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014.
297
23.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014.
283
24.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014.
271
25.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014.
259
26.Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014.
205
27.Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014.   
146
28.Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014.
133
29.Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014.
130
30.Certified Bitcoins Ateniese, Giuseppe and Faonio, Antonio and Magri, Bernardo and de Medeiros, Breno. 2014.
70
31.On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Courtois, Nicolas T. 2014.
70
32.Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014.
69
33.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014.
65
34.Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014.
56
35.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014.
41
36.Darkcoin : Peer ­ to ­ Peer Crypto ­ Currency with Anonymous Blockchain Transactions and an Improved Proof ­ of ­ Work System Duffield, Evan and Hagan, Kyle. 2014.
38
37.Distributed Cryptography Based on the Proofs of Work. Andrychowicz, Marcin and Dziembowski, Stefan. 2014.
37
38.Secure protocols for accountable warrant execution Kroll, Joshua and Felten, Edward and Boneh, Dan. 2014.
24
39.Rational zero: Economic security for zerocoin with everlasting anonymity Garman, Christina and Green, Matthew and Miers, Ian and Rubin, Aviel D. 2014.
23
40.Efficient NIZK arguments via parallel verification of benes networks Lipmaa, Helger. 2014.
14

Videos