Papers (40)

#Title
Citations
1.Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014.   
9349
2.A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014.   
6010
3.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014.   
3173
4.Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014.   
2722
5.Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014.   
2338
6.The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014.   
2062
7.Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014.
1020
8.Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014.
1008
9.The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014.
984
10.Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014.
901
11.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014.
846
12.Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014.
663
13.An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014.
623
14.CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014.
614
15.Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014.
596
16.The Miner's Dilemma Eyal, Ittay. 2014.   
596
17.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014.
574
18.How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014.
490
19.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014.
489
20.Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014.
433
21.Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014.
361
22.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014.
321
23.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014.
316
24.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014.
286
25.Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014.
217
26.Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014.   
169
27.Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014.
140
28.Certified Bitcoins Ateniese, Giuseppe and Faonio, Antonio and Magri, Bernardo and de Medeiros, Breno. 2014.
78
29.On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Courtois, Nicolas T. 2014.
74
30.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014.
74
31.Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014.
72
32.Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014.
60
33.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014.
49
34.Darkcoin : Peer ­ to ­ Peer Crypto ­ Currency with Anonymous Blockchain Transactions and an Improved Proof ­ of ­ Work System Duffield, Evan and Hagan, Kyle. 2014.
43
35.Distributed Cryptography Based on the Proofs of Work. Andrychowicz, Marcin and Dziembowski, Stefan. 2014.
40
36.Secure protocols for accountable warrant execution Kroll, Joshua and Felten, Edward and Boneh, Dan. 2014.
26
37.Rational zero: Economic security for zerocoin with everlasting anonymity Garman, Christina and Green, Matthew and Miers, Ian and Rubin, Aviel D. 2014.
23
38.Efficient NIZK arguments via parallel verification of benes networks Lipmaa, Helger. 2014.
14
39.Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014.
0
40.Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014.
0

Videos