all algorand anonymity [applications] attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2019-02-12

1.Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016
2.Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015
3.A smart contract for boardroom voting with maximum voter privacy McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2017
4.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
5.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
6.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
7.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
8.Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016
9.Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Dagher, Gaby G and Bünz, Benedikt and Bonneau, Joseph and Clark, Jeremy and Boneh, Dan. 2015
10.SMART POOL : Practical Decentralized Pooled Mining Luu, Loi and Velner, Yaron and Teutsch, Jason and Saxena, Prateek. 2017
11.SCPKI: A smart contract-based PKI and identity system Al-Bassam, Mustafa. 2017
12.Instantaneous Decentralized Poker Iddo Bentov and Ranjit Kumaresan and Andrew Miller. 2017
13.Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo. 2017
14.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
15.Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch. 2018
16.IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto and Raphael M. Reischuk. 2016
17.Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017
18.Zero-Collateral Lotteries in Bitcoin and Ethereum Miller, Andrew and Bentov, Iddo. 2016
19.Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Reyzin, Leonid and Meshkov, Dmitry and Chepurnoy, Alexander and Ivanov, Sasha. 2016
20.0x: An open protocol for decentralized exchange on the Ethereum blockchain Warren, Will and Bandeali, Amir. 2017
21.SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains Gueta, Guy Golan and Abraham, Ittai and Grossman, Shelly and Malkhi, Dahlia and Pinkas, Benny and Reiter, Michael K and Seredinschi, Dragos-Adrian and Tamir, Orr and Tomescu, Alin. 2018
22.zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula and Willy Vasquez and Madars Virza. 2018
23.Strain: A Secure Auction for Blockchains Erik-Oliver Blass and Florian Kerschbaum. 2017
24.Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal Goldwasser, Shafi and Park, Sunoo. 2017
25.Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2017
26.ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2018
27.Decentralized Blacklistable Anonymous Credentials with Reputation Yang, Rupeng and Au, Man Ho and Xu, Qiuliang and Yu, Zuoxia. 2017
28.Loopring: A decentralized token exchange protocol Wang, Daniel and Zhou, Jay and Wang, Alex and Finestone, Matthew. 2018
29.Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George. 2018
30.MARS: Monetized Ad-hoc Routing System (A Position Paper) David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
31.R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate. 2018
32.Privacy Preserving Verifiable Key Directories. Chase, Melissa and Deshpande, Apoorvaa and Ghosh, Esha. 2018
33.Pies: Public incompressible encodings for decentralized storage Cecchetti, Ethan and Miers, Ian and Juels, Ari. 2018
34.Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos and Panagiotakos, Giorgos. 2018
35.21-bringing down the complexity: fast composable protocols for card games without secret state David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
36.ZeroLedge: Proving Solvency with Privacy Doerner, Jack and Shelat, Abhi and Evans, David. 2018
37.Developing a K-ary malware using Blockchain Moubarak, Joanna and Filiol, Eric and Chamoun, Maroun. 2018
38.On the Practicality of Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2019