bitcoin
Papers (171)
# | Title | |
1. | Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, Satoshi. 2008. | |
2. | Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015. | |
3. | Bitcoin and cryptocurrency technologies: a comprehensive introduction Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. 2016. | |
4. | Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014. | |
5. | Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014. | |
6. | A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013. | |
7. | Information propagation in the Bitcoin network Decker, Christian and Wattenhofer, Roger. 2013. | |
8. | The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015. | |
9. | The bitcoin lightning network: Scalable off-chain instant payments Poon, Joseph and Dryja, Thaddeus. 2016. | |
10. | A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018. | |
11. | Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012. | |
12. | Evaluating user privacy in bitcoin Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan. 2013. | |
13. | Enhancing bitcoin security and performance with strong consistency via collective signing Kogias, Eleftherios Kokoris and Jovanovic, Philipp and Gailly, Nicolas and Khoffi, Ismail and Gasser, Linus and Ford, Bryan. 2016. | |
14. | The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013. | |
15. | Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014. | |
16. | Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017. | |
17. | From mining to markets: The evolution of bitcoin transaction fees Easley, David and O'Hara, Maureen and Basu, Soumya. 2019. | |
18. | Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014. | |
19. | Decentralization in bitcoin and ethereum networks Gencer, Adem Efe and Basu, Soumya and Eyal, Ittay and Van Renesse, Robbert and Sirer, Emin G\"un. 2018. | |
20. | Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014. | |
21. | On the instability of bitcoin without the block reward Carlsten, Miles and Kalodner, Harry and Weinberg, S Matthew and Narayanan, Arvind. 2016. | |
22. | On Bitcoin and red balloons Babaioff, Moshe and Dobzinski, Shahar and Oren, Sigal and Zohar, Aviv. 2011. | |
23. | Difficulty control for blockchain-based consensus systems Kraft, Daniel. 2016. | |
24. | TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub Heilman, Ethan and Alshenibr, Leen and Baldimtsi, Foteini and Scafuro, Alessandra and Goldberg, Sharon. 2017. | |
25. | Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014. | |
26. | The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay and Aggelos Kiayias and Nikos Leonardos. 2016. | |
27. | Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014. | |
28. | Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018. | |
29. | Concurrency and privacy with payment-channel networks Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan. 2017. | |
30. | Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016. | |
31. | Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014. | |
32. | On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013. | |
33. | Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas. 2017. | |
34. | Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions Heilman, Ethan and Baldimtsi, Foteini and Goldberg, Sharon. 2016. | |
35. | Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016. | |
36. | Incentive Compatibility of Bitcoin Mining Pool Reward Functions Schrijvers, Okke and Bonneau, Joseph and Boneh, Dan and Roughgarden, Tim. 2016. | |
37. | Have a Snack, Pay with Bitcoins Bamert, Tobias and Decker, Christian and Elsen, Lennart and Wattenhofer, Roger and Welten, Samuel. 2013. | |
38. | On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015. | |
39. | On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015. | |
40. | P2P Mixing and Unlinkable Bitcoin Transactions. Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2017. | |
41. | Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013. | |
42. | Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees M\"oser, Malte and B\"ohme, Rainer. 2015. | |
43. | Flare: An approach to routing in lightning network Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa. 2016. | |
44. | Non Outsourceable scratch-off puzzles to discourage bitcoin mining coalitions Miller, Andrew and Kosba, Ahmed and Katz, Jonathan and Shi, Elaine. 2015. | |
45. | Proof-of-Burn Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2019. | |
46. | Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin Zhang, Ren and Preneel, Bart. 2017. | |
47. | How to use bitcoin to play decentralized poker Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo. 2015. | |
48. | Validation of decentralised smart contracts through game theory and formal methods Bigi, Giancarlo and Bracciali, Andrea and Meacci, Giovanni and Tuosto, Emilio. 2015. | |
49. | Confidential assets Poelstra, Andrew and Back, Adam and Friedenbach, Mark and Maxwell, Gregory and Wuille, Pieter. 2018. | |
50. | Incentivizing blockchain forks via whale transactions Liao, Kevin and Katz, Jonathan. 2017. | |
51. | When bitcoin mining pools run dry Laszka, Aron and Johnson, Benjamin and Grossklags, Jens. 2015. | |
52. | On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015. | |
53. | TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions Delgado-Segura, Sergi and Bakshi, Surya and P\'erez-Sol\`a, Cristina and Litton, James and Pachulski, Andrew and Miller, Andrew and Bhattacharjee, Bobby. 2018. | |
54. | A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020. | |
55. | Towards bitcoin payment networks McCorry, Patrick and M\"oser, Malte and Shahandasti, Siamak F and Hao, Feng. 2016. | |
56. | Mimblewimble Poelstra, Andrew. 2016. | |
57. | Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016. | |
58. | Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019. | |
59. | FastKitten: Practical Smart Contracts on Bitcoin Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Host\'akov\'a, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza. 2019. | |
60. | Redesigning Bitcoin’s fee market Lavi, Ron and Sattath, Or and Zohar, Aviv. 2022. | |
61. | Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015. | |
62. | Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks Egger, Christoph and Moreno-Sanchez, Pedro and Maffei, Matteo. 2019. | |
63. | SoK: unraveling Bitcoin smart contracts Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino. 2018. | |
64. | Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015. | |
65. | Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017. | |
66. | A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems Hu, Bin and Zhang, Zongyang and Liu, Jianwei and Liu, Yizhong and Yin, Jiayuan and Lu, Rongxing and Lin, Xiaodong. 2020. | |
67. | Strong federations: An interoperable blockchain solution to centralized third-party risks Dilley, Johnny and Poelstra, Andrew and Wilkins, Jonathan and Piekarska, Marta and Gorlick, Ben and Friedenbach, Mark. 2016. | |
68. | Bitcoin covenants M\"oser, Malte and Eyal, Ittay and Sirer, Emin G\"un. 2016. | |
69. | Analysis of Nakamoto Consensus Ling Ren. 2019. | |
70. | BitML: a calculus for Bitcoin smart contracts Massimo Bartoletti and Roberto Zunino. 2018. | |
71. | Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017. | |
72. | Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015. | |
73. | When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016. | |
74. | SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018. | |
75. | Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014. | |
76. | Erlay: Efficient transaction relay for bitcoin Naumenko, Gleb and Maxwell, Gregory and Wuille, Pieter and Fedorova, Alexandra and Beschastnikh, Ivan. 2019. | |
77. | Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017. | |
78. | How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014. | |
79. | A user-centric system for verified identities on the bitcoin blockchain Augot, Daniel and Chabanne, Herv\'e and Chenevier, Thomas and George, William and Lambert, Laurent. 2017. | |
80. | Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017. | |
81. | Tracing Transactions Across Cryptocurrency Ledgers Yousaf, Haaroon and Kappos, George and Meiklejohn, Sarah. 2018. | |
82. | eltoo: A simple layer2 protocol for bitcoin Decker, Christian and Russell, Rusty and Osuntokun, Olaoluwa. 2018. | |
83. | Tight Consistency Bounds for Bitcoin Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020. | |
84. | Committing to quantum resistance: A slow defence for Bitcoin against a fast quantum computing attack Stewart, Iain and Ilie, D and Zamyatin, Alexei and Werner, Sam and Torshizi, MF and Knottenbelt, William J. 2018. | |
85. | Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014. | |
86. | Partitioning Attacks on Bitcoin: Colliding Space, Time and Logic Saad, Muhammad and Cook, Victor and Nguyen, Lan and Thai, My T and Mohaisen, Aziz. 2019. | |
87. | Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer. 2019. | |
88. | Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017. | |
89. | Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016. | |
90. | A Composable Security Treatment of the Lightning Network Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos. 2019. | |
91. | Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019. | |
92. | A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020. | |
93. | Bitcoin-Compatible Virtual Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020. | |
94. | Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020. | |
95. | Constant-deposit multiparty lotteries on Bitcoin Bartoletti, Massimo and Zunino, Roberto. 2017. | |
96. | Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Dryja, Thaddeus. 2019. | |
97. | LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019. | |
98. | Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014. | |
99. | Rootstock: Bitcoin powered smart contracts Lerner, S Demian. 2015. | |
100. | Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019. | |
101. | A Proof-of-Stake protocol for consensus on Bitcoin subchains Bartoletti, Massimo and Lande, Stefano and Podda, Alessandro Sebastian. 2017. | |
102. | Blitz: Secure Multi-Hop Payments Without Two-Phase Commits Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei. 2021. | |
103. | Verifying liquidity of Bitcoin contracts Bartoletti, Massimo and Zunino, Roberto. 2018. | |
104. | A percolation model for the emergence of the Bitcoin Lightning Network Bartolucci, Silvia and Caccioli, Fabio and Vivo, Pierpaolo. 2019. | |
105. | Bitcoin Transaction Networks: an overview of recent results Vallarano, Nicol\`o and Tessone, Claudio and Squartini, Tiziano. 2020. | |
106. | An incentive analysis of some Bitcoin fee designs Yao, Andrew Chi-Chih. 2018. | |
107. | Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan Garay and Aggelos Kiayias and Nikos Leonardos. 2020. | |
108. | Prism: Scaling Bitcoin by 10,000 x Yang, Lei and Bagaria, Vivek and Wang, Gerui and Alizadeh, Mohammad and Tse, David and Fanti, Giulia and Viswanath, Pramod. 2019. | |
109. | Ride the lightning: The game theory of payment channels Avarikioti, Zeta and Heimbach, Lioba and Wang, Yuyi and Wattenhofer, Roger. 2020. | |
110. | Enhancing Bitcoin transactions with covenants O’Connor, Russell and Piekarska, Marta. 2017. | |
111. | Developing secure Bitcoin contracts with BitML Atzei, Nicola and Bartoletti, Massimo and Lande, Stefano and Yoshida, Nobuko and Zunino, Roberto. 2019. | |
112. | How to Charge Lightning Br\^anzei, Simina and Segal-Halevi, Erel and Zohar, Aviv. 2017. | |
113. | Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger. 2020. | |
114. | Liquid: A Bitcoin Sidechain Nick, Jonas and Poelstra, Andrew and Sanders, Gregory. 2020. | |
115. | On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang and Bart Preneel. 2017. | |
116. | Splitting Payments Locally While Routing Interdimensionally Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos. 2020. | |
117. | Making bitcoin exchanges transparent Decker, Christian and Guthrie, James and Seidel, Jochen and Wattenhofer, Roger. 2015. | |
118. | Scalable lightning factories for Bitcoin Alejandro Ranchal Pedrosa and Maria Potop-Butucaru and Sara Tucci Piergiovanni. 2019. | |
119. | Lightning Factories Pedrosa, Alejandro Ranchal and Potop-Butucaru, Maria and Tucci-Piergiovanni, Sara. 2019. | |
120. | Fun with Bitcoin smart contracts Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino. 2018. | |
121. | The mathematics of Bitcoin Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020. | |
122. | TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt. 2020. | |
123. | On Profitability of Nakamoto double spend Grunspan, Cyril and P\'erez-Marco, Ricardo. 2019. | |
124. | How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015. | |
125. | Bandwidth-Efficient Transaction Relay for Bitcoin Naumenko, Gleb and Maxwell, Gregory and Wuille, Pieter and Fedorova, Sasha and Beschastnikh, Ivan. 2019. | |
126. | FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld. 2021. | |
127. | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin Tran, Muoi and Shenoi, Akshaye and Kang, Min Suk. 2021. | |
128. | Characterizing Orphan Transactions in the Bitcoin Network Imtiaz, Muhammad Anas and Starobinski, David and Trachtenberg, Ari. 2019. | |
129. | A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020. | |
130. | Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen and Bas Spitters. 2020. | |
131. | Bitcoin's Latency--Security Analysis Made Simple Guo, Dongning and Ren, Ling. 2022. | |
132. | Blockchain with Varying Number of Players T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi. 2020. | |
133. | Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov. 2021. | |
134. | The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden. 2019. | |
135. | Coalition-Safe Equilibria with Virtual Payoffs Kiayias, Aggelos and Stouka, Aikaterini-Panagiota. 2019. | |
136. | An empirical study of availability and reliability properties of the Bitcoin Lightning Network Waugh, Finnegan and Holz, Ralph. 2020. | |
137. | MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Minaei, Mohsen and Moreno-Sanchez, Pedro and Kate, Aniket. 2020. | |
138. | ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019. | |
139. | Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020. | |
140. | Atomic Swaps between Bitcoin and Monero Hoenisch, Philipp and del Pino, Lucas Soriano. 2021. | |
141. | Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020. | |
142. | Tracking Mixed Bitcoins Tironsakkul, Tin and Maarek, Manuel and Eross, Andrea and Just, Mike. 2020. | |
143. | Merkle Trees Optimized for Stateless Clients in Bitcoin Bailey, Bolton and Sankagiri, Suryanarayana. 2021. | |
144. | A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements Sunny Katkuri. 2018. | |
145. | Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018. | |
146. | The Arwen Trading Protocols (Full Version) Ethan Heilman and Sebastien Lipmann and Sharon Goldberg. 2020. | |
147. | A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018. | |
148. | Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020. | |
149. | Model Checking Bitcoin and other Proof-of-Work Consensus Protocols DiGiacomo-Castillo, Max and Liang, Yiyun and Pal, Advay and Mitchell, John C. 2020. | |
150. | Formal Modelling and Security Analysis of Bitcoin's Payment Protocol Modesti, Paolo and Shahandashti, Siamak F and McCorry, Patrick and Hao, Feng. 2021. | |
151. | Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun. 2019. | |
152. | Renegotiation and recursion in Bitcoin contracts Bartoletti, Massimo and Murgia, Maurizio and Zunino, Roberto. 2020. | |
153. | Number of confirmation blocks for Bitcoin and GHOST consensus protocols on networks with delayed message delivery Kovalchuk, Lyudmila and Kaidalov, Dmytro and Nastenko, Andrii and Shevtsov, Oleksiy and Rodinko, Mariia and Oliynykov, Roman. 2018. | |
154. | Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020. | |
155. | 12 Angry Miners Eghbali, Aryaz and Wattenhofer, Roger. 2019. | |
156. | Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020. | |
157. | The Bitcoin Cash Backbone Protocol Juan Garay and Yu Shen. 2021. | |
158. | Security of Nakamoto Consensus under Congestion Lucianna Kiffer and Joachim Neu and Srivatsan Sridhar and Aviv Zohar and David Tse. 2023. | |
159. | Contractvm: decentralized applications on Bitcoin Bartoletti, Massimo and Gessa, Davide and Podda, Alessandro Sebastian. 2018. | |
160. | Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin. Ruffing, Tim and Moreno-Sanchez, Pedro. 2017. | |
161. | Generalized Bitcoin-Compatible Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020. | |
162. | Leveraging Weight Functions for Optimistic Responsiveness in Blockchains Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi. 2020. | |
163. | Verification of recursive Bitcoin contracts Bartoletti, Massimo and Lande, Stefano and Murgia, Maurizio and Zunino, Roberto. 2020. | |
164. | The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels Rezaei, Fatemeh and Naseri, Shahrzad and Eyal, Ittay and Houmansadr, Amir. 2020. | |
165. | Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search Cojocaru, Alexandru and Garay, Juan and Kiayias, Aggelos and Song, Fang and Wallden, Petros. 2020. | |
166. | Semantics and complexity of bitcoin script Reisenegger Butr\'on, Thomas. 2021. | |
167. | Glimpse: On-Demand, Cross-Chain Communication for Efficient DeFi Applications on Bitcoin-based Blockchains Giulia Scaffino and Lukas Aumayr and Zeta Avarikioti and Matteo Maffei. 2022. | |
168. | Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs Javier Álvarez Cid-Fuentes and Diego Angel Masini and Sergio Demian Lerner. 2023. | |
169. | CHAUSSETTE: A Symbolic Verification of Bitcoin Scripts Jacquot, Vincent and Donnet, Beno\^\it. 2023. | |
170. | Understanding BRC-20: Hope or Hype Wang, Qin and Yu, Guangsheng. 2023. | |
171. | How to Physically Hold Your Bitcoins ? Houda Ferradi and Antoine Houssais and David Naccache. 2023. |
Videos
–
Links
–