all algorand anonymity [applications] attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin


A curated list of papers ordered by number of citations. Last updated 2018-12-08

#Title
Citations
1.Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016
112
2.Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015
101
3.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
61
4.A smart contract for boardroom voting with maximum voter privacy McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2017
59
5.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
58
6.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
52
7.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
30
8.Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016
29
9.SCPKI: A smart contract-based PKI and identity system Al-Bassam, Mustafa. 2017
23
10.Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Dagher, Gaby G and Bünz, Benedikt and Bonneau, Joseph and Clark, Jeremy and Boneh, Dan. 2015
22
11.SMART POOL : Practical Decentralized Pooled Mining Luu, Loi and Velner, Yaron and Teutsch, Jason and Saxena, Prateek. 2017
21
12.Instantaneous Decentralized Poker Iddo Bentov and Ranjit Kumaresan and Andrew Miller. 2017
19
13.Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo. 2017
19
14.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
15
15.IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto and Raphael M. Reischuk. 2016
13
16.Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017
12
17.Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Reyzin, Leonid and Meshkov, Dmitry and Chepurnoy, Alexander and Ivanov, Sasha. 2016
12
18.Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch. 2018
10
19.Zero-Collateral Lotteries in Bitcoin and Ethereum Miller, Andrew and Bentov, Iddo. 2016
8
20.0x: An open protocol for decentralized exchange on the Ethereum blockchain Warren, Will and Bandeali, Amir. 2017
8
21.zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula and Willy Vasquez and Madars Virza. 2018
5
22.Strain: A Secure Auction for Blockchains Erik-Oliver Blass and Florian Kerschbaum. 2017
4
23.Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal Goldwasser, Shafi and Park, Sunoo. 2017
4
24.SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains Gueta, Guy Golan and Abraham, Ittai and Grossman, Shelly and Malkhi, Dahlia and Pinkas, Benny and Reiter, Michael K and Seredinschi, Dragos-Adrian and Tamir, Orr and Tomescu, Alin. 2018
4
25.Loopring: A decentralized token exchange protocol Wang, Daniel and Zhou, Jay and Wang, Alex and Finestone, Matthew. 2018
3
26.Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George. 2018
3
27.Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2017
2
28.Decentralized Blacklistable Anonymous Credentials with Reputation Yang, Rupeng and Au, Man Ho and Xu, Qiuliang and Yu, Zuoxia. 2017
2
29.ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2018
1
30.MARS: Monetized Ad-hoc Routing System (A Position Paper) David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
1
31.R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate. 2018
1
32.Privacy Preserving Verifiable Key Directories. Chase, Melissa and Deshpande, Apoorvaa and Ghosh, Esha. 2018
1
33.Pies: Public incompressible encodings for decentralized storage Cecchetti, Ethan and Miers, Ian and Juels, Ari. 2018
1
34.Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos and Panagiotakos, Giorgos. 2018
1
35.21-bringing down the complexity: fast composable protocols for card games without secret state David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
0
36.ZeroLedge: Proving Solvency with Privacy Doerner, Jack and Shelat, Abhi and Evans, David. 2018
0
37.Developing a K-ary malware using Blockchain Moubarak, Joanna and Filiol, Eric and Chamoun, Maroun. 2018
0