Papers (36)

#Title
Citations
1.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016.
261
2.Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei. 2019.   
238
3.Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018.   
207
4.Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) Pornin, Thomas. 2013.
191
5.Fast secure two-party ECDSA signing Lindell, Yehuda. 2017.   
180
6.Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018.
171
7.Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018.
135
8.Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019.
110
9.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019.   
93
10.UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Canetti, Ran and Gennaro, Rosario and Goldfeder, Steven and Makriyannis, Nikolaos and Peled, Udi. 2020.
88
11.LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom. 2020.   
75
12.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015.
71
13.Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019.
68
14.Bandwidth-efficient threshold EC-DSA Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker. 2020.  
64
15.One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro and Steven Goldfeder. 2020.   
64
16.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017.
52
17.Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020.
44
18.Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020.
43
19.A Formal Treatment of Deterministic Wallets Das, Poulami and Faust, Sebastian and Loss, Julian. 2019.
38
20.Verifiable Timed Signatures Made Practical Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and D\"ottling, Nico and Kate, Aniket and Schr\"oder, Dominique. 2020.
35
21.UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti and Nikolaos Makriyannis and Udi Peled. 2020.
32
22.Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits. 2019.
26
23.Threshold ECDSA for Decentralized Asset Custody Adam Gągol and Damian Straszak. 2020.
25
24.A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits. 2020.
23
25.Thresholdizing HashEdDSA: MPC to the rescue Bonte, Charlotte and Smart, Nigel P and Tanguy, Titouan. 2021.
18
26.An airdrop that preserves recipient privacy⋆ Wahby, Riad S and Boneh, Dan and Jeffrey, Christopher and Poon, Joseph. 2020.  
15
27.A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019.
14
28.On the security of ECDSA with additive key derivation and presignatures Jens Groth and Victor Shoup. 2021.
14
29.Threshold ECDSA with an Offline Recovery Party Battagliola, Michele and Longo, Riccardo and Meneghetti, Alessio and Sala, Massimiliano. 2020.
11
30.ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019.
8
31.Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis. 2021.
1
32.Off-chain protocols for cryptocurrencies Goldfeder, Steven Andrew and others. 2018.
0
33.Absentia: secure function evaluation on Ethereum Demirag, Didem and Clark, Jeremy. 2021.
0
34.Limits in the Provable Security of ECDSA Signatures Dominik Hartmann and Eike Kiltz. 2023.
0
35.The curious case of the half-half Bitcoin ECDSA nonces Dylan Rowe and Joachim Breitner and Nadia Heninger. 2023.
0
36.Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis and Oren Yomtov. 2023.
0

Videos